“…The decryption method takes the following form: Form sequences of two allowed 2-grams meta(2,2), e.g., etru, isis, isth, ruth, thet, this Form a correspondence between like and unlike patterns using symbols such as A and B (Table 3.2) where A is different from B and vice versa. Form their associated patterns of meta (2,3) in Table 4. Form their associated matching patterns of (2,4) in Table 5.…”