Professor Kate Poirier, Spring 2017

Code-Breaking

N zxj xmnky hnumjw rjymti yt jshwduy umnx rjxxflj.

3 Comments

  1. francisirizarry

    Djfm, Ny’x uwjyyd stynhjfgqj ymfy rtxy ujtuqj uwjkjw yt zxj ymj xmnky rjymti fx ny’x vznyj jfxd :I

    • Ka Yat

      HNB, RC RB NJBH

  2. Mohammed Goni

    The method used is shift cipher.
    Rule used: f(p) = (p-5) Mod 26
    Message: I use shift cipher method to encrypt phis message.
    Note: Lillian also contributed to break this code.

Leave a Reply

Your email address will not be published. Required fields are marked *