wired
Figure 5: Simple Columnar Transposition Technique to decrypt the ciphertext