Create a message of four or five words, and then choose three passwords of varying lengths (at least one should be shorter than the message itself). Then, using the substitution table below, perform simple encryption on the message.
Compare the ciphertexts. Can you see a pattern of matching characters? Describe your observations: