Let’s look at an old Roman age encryption scheme. Let’s say we intercepted a message from a known Celtic hacker group.