Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
Queen
1 months agoBronwyn
6 days agoEttie
1 months agoTheodora
3 days agoDannie
8 days agoDan
25 days agoJennie
2 months agoKanisha
11 days agoGerald
26 days agoEric
1 months agoTorie
1 months agoJoesph
2 months agoTorie
25 days agoDonette
1 months agoGlenn
2 months agoLeslie
2 months agoTelma
2 months ago