Alice used a transposition cipher to encrypt her messages toBob. For added security, she encrypted the transposition cipher keyusing a substitution cipher and kept the encrypted cipher in hercomputer. Trudy managed to get hold of the encrypted transpositioncipher key. Can Trudy decipher Alice’s messages to Bob? Why or whynot?
Expert Answer
An answer will be send to you shortly. . . . .