Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Queen
25 days agoEttie
27 days agoDan
16 days agoJennie
1 months agoKanisha
2 days agoGerald
17 days agoEric
27 days agoTorie
28 days agoJoesph
2 months agoTorie
16 days agoDonette
27 days agoGlenn
2 months agoLeslie
2 months agoTelma
2 months ago