Code-Breaking April 11, 2017 / Ka Yat / 3 Comments N zxj xmnky hnumjw rjymti yt jshwduy umnx rjxxflj. Code-breaking Previous post Jiayu and Juliano ‘s “Code-Breaking” Next post “CODE-BREAKING” JOSHUA, CHRIS, (GUY THAT SITS NEXT TO CHRIS FROM THE WINDOW) “sorry man i forgot your name ;-P” 3 Comments francisirizarry April 11, 2017 at 6:50 pm Djfm, Ny’x uwjyyd stynhjfgqj ymfy rtxy ujtuqj uwjkjw yt zxj ymj xmnky rjymti fx ny’x vznyj jfxd :I Reply Ka Yat (Post author) April 13, 2017 at 5:28 pm HNB, RC RB NJBH Reply Mohammed Goni April 15, 2017 at 6:25 pm The method used is shift cipher. Rule used: f(p) = (p-5) Mod 26 Message: I use shift cipher method to encrypt phis message. Note: Lillian also contributed to break this code. Reply Leave a Reply Cancel replyYour email address will not be published. Required fields are marked *Comment * Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Δ
Djfm, Ny’x uwjyyd stynhjfgqj ymfy rtxy ujtuqj uwjkjw yt zxj ymj xmnky rjymti fx ny’x vznyj jfxd :I
HNB, RC RB NJBH
The method used is shift cipher.
Rule used: f(p) = (p-5) Mod 26
Message: I use shift cipher method to encrypt phis message.
Note: Lillian also contributed to break this code.