Cryptography What this program do: Transposition cipher > Substitution cipher > Separate into groups of 5 P.S.: In the Substitution cipher, the program uses a keyword to process the substitution table.