Every piece of information you receive from spies uses the most classic encryption algorithm: letter replacement. For example, A is represented by C, B is represented by Z...
But the key is lost. You can only rely on the wisdom of your chief cryptographer and your excellent English to crack the original information.
Let's start working!
But the key is lost. You can only rely on the wisdom of your chief cryptographer and your excellent English to crack the original information.
Let's start working!
Show More