An unsafe but fun cipher.
Basically, we just refer to this table to encode and decode
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
😄 | 😃 | 😀 | 😊 | 😅 | 😉 | 😍 | 😘 | 😚 | 😗 | 😙 | 😜 | 😝 | 😛 | 😳 | 😁 | 😔 | 😌 | 😒 | 😞 | 😣 | 😢 | 😂 | 😭 | 😎 | 😈 |
If an attacker know that the message was encoded using this algorithm, he can easily crack it.