Use a 2-stage transposition technique to encrypt a message. The following information is what is needed to do this encryption:
transposition cipher technique works by permuting the letters of the
plaintext. It is not very secure, but it is great for learning about
cryptography (ignore the comma and the period in the message).
In a 2 page paper, demonstrate this encryption and how you arrived at your answer.
In addition, answer the following questions:
Is it possible to decrypt the message with a different key? Justify your answer.
Do you agree with the statement of the message? Provide examples to support your view.