Introduction - If you have any usage issues, please Google them yourself
The encryption and decryption of the transposition cipher algorithm are realized. In the same program, the encryption and decryption program is encrypted or decrypted by the input 1or2.