Answer the question
In order to leave comments, you need to log in
How to attack table encryption method with key?
The task of decrypting text encoded using table encryption with a key.
The result is the decoded text and key value.
OSIGKELREIBDKIAAAMAIZREOCHVMMUVAONGEICHOOPIEEAOSPSUADP
MAOLSAAAELISTRVDODOVIEWRPTOKTZFKTOSTAGKBBRPLGYANNL
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question