The messages below were encrypted using the technique illustrated in Figure 2-10 (using displacement keys other than
Question:
The messages below were encrypted using the technique illustrated in Figure 2-10 (using displacement keys other than 5). Using trial and error, decode them. Hint: This task becomes easy if you use an Excel spreadsheet and VLookUp formulas that reference a table of letters and their numeric equivalencies.
Message 1 OZ OY TUZ CNGZ CK JUTZ QTUC ZNGZ NAXZY AY OZ OY CNGZ CK JU QTUC ZNGZ PAYZ GOTZ YU
Message 2 QBZAPJL KLSHFLK PZ QBZAPJL KLUPLK
Message 3 FAA YMZK OAAWE EBAUX FTQ NDAFT
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Core concepts of accounting information systems
ISBN: 978-1118742938
13th edition
Authors: Jacob M. Rose, Mark G. Simkin, Carolyn Strand Norman
Question Posted: