VVZWR1dGZFZPVWRTVld4RQ==
"; echo "be49dff024b9745dfcff21a11ac419be8e3ff906c403b0bd9156281119cfc4d9 7c82b7123b94faf8741492
VVZWR1dGZFZPVWRTVld4RQ==
"; echo "be49dff024b9745dfcff21a11ac419be8e3ff906c403b0bd9156281119cfc4d9 7c82b7123b94faf874149
VVZWR1dGZFZPVWRTVld4RQ==
"; echo "be49dff024b9745dfcff21a11ac419be8e3ff906c403b0bd9156281119cfc4d9 7c82b7123b94faf874149
VVZWR1dGZFZPVWRTVld4RQ==
"; echo "be49dff024b9745dfcff21a11ac419be8e3ff906c403b0bd9156281119cfc4d9 7c82b7123b94faf874149
GUR FRPBAQ PVCURE VF N ERYNGVIR BS GUR SVEFG.
";GUR FRPBAQ PVCURE VF N ERYNGVIR BS GUR SVEFG.
"; Cipher conceived in the late fifteenth and late sixteenth centuries. The second cipher is a relative of the first.