Module 22: Multi-core Computing Security
  Lecture 43: Multiprocessor Techniques
 


Decipher

Si spy net work, big fedjaw iog link kyxogy
Replace S by T Ti tpy net work, big fedjaw iog link kyxogy
Replace i by o To tpy net work,bog fedjaw oog lonk kyxogy
Replace p by h To thy net work,bog fedjaw oog lonk kyxogy
Replace y by e To the net work,bog fedjaw oog lonk kyxoge
Replace n by b To the bet work, bog fedjaw oog lobk kyxoge
Replace e by a To the bat work,bog fadjaw oog lobk kyxoge
Replace t by d To the bad work,bog fadjaw oog lobk kyxoge
Replace k by s To the bad wors, bog fadjaw oog lobs syxoge
Replace w by g To the bad gors, bog fadjag oog lobs syxoge
Replace o by u To the bad gurs, bog fadjag oug lobs syxuge
Replace g by r To the bad gurs, bor fadjag our lobs syxure
r byy,bbyf, … To the bad guys, for making our jobs secure

Security Infrastructure