START OF KEY
J U S T D A N C E B F G H I K L M O P Q R V W X Y Z
| | | | | | | | | | | | | | | | | | | | | | | | | |
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
J corresponds to A
U corresponds to B
S corresponds to C
T corresponds to D
D corresponds to E
A corresponds to F
N corresponds to G
C corresponds to H
E corresponds to I
B corresponds to J
J U S T D A N C E B F G H I K L M O P Q R V W X Y Z
| | | | | | | | | | | | | | | | | | | | | | | | | |
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
END OF KEY
And so on.
Person 1 solves the cryptogram stated below and comes up with another different cryptogram and then Person 2 solves the cryptogram made by Person 1 and so on. Cryptograms must use the key above.
Use this website to help: https://cryptii.com/pipes/alphabetical-substitution
SUBSTITUTION ENCRYPTION
DO NOT SCRAMBLE NUMBERS IF NUMBERS ARE IN YOUR CODE
==The code: BRPQ TJISD RIGEHEQDT==