# Secret Codes II

There are essentially only two operations involved in the encryption of a message: substitution and transposition.