volt versed in codes crypt
analysis of bytes form
___