33 transposition technique to encrypt the following message using the key “Decrypt”. Ignore the comma and

There are two parts to this assignment. Part 1 involves the encryption/decryption scenario below and Part 2 requires research on the classification of ciphers, and popular algorithms. Use a two-stage transposition technique to encrypt the following message using the key “Decrypt”. Ignore the comma and the period in the message. Message: “The Transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptography.” In a 2–3 page summary, discuss the following: