There are two parts to this assignment. Part 1 involves the encryption/decryption scenario below and Part 2 requires research on the classification of ciphers, and popular algorithms. Use a two-stage transposition technique to encrypt the following message using the key Decrypt. Ignore the comma and the period in the message. Message: The Transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptography. In a 23 page summary, discuss the following: