Figure 5:
Simple Columnar Transposition Technique to decrypt the ciphertext