Monthly Archives: February 2011

Kshitij Encryption Problem

The Encryption Problem The encryption scheme that is as follows: He forms an X-cipher using ā€˜nā€™ no. of rows, where he starts writing the characters of his message from the top left corner of the X and goes diagonally downwards … Continue reading

Posted in Information Technology | Leave a comment

Hello world!

Welcome to This is your first post. Edit or delete it and start blogging!

Posted in Uncategorized | 1 Comment