Substitution Transposed

Substitution and Transposition all in one! How fiendish can these codes get?
Exploring and noticing Working systematically Conjecturing and generalising Visualising and representing Reasoning, convincing and proving
Being curious Being resourceful Being resilient Being collaborative

This problem follows on from Substitution Cipher and Transposition Cipher



Below is a secret message. It's been double encrypted, first using a substitution cipher and then using a transposition cipher. Can you decipher it?

 

whhujnjwuzlwvvdhgdlkqwdhvdkelqhldwurlhhwklwwuhdwdgqjkhzqqbrhowkgbqkq
ywhuovwfzebzlhhzfwrlkwrhddhhhkdqsqhkkuohkrfqqdujdbjdvulhgoidpwggvhlg
vwqdhollduwzudhwqqhhrwqmguqzrzlljykrzyaprgxuidlqdwfrhhwlhfdppvhduwwv
kerukuwuhvldwqwbkgfkhgbrdkwsnpgrdkufrdrogpxllkwhhduqhhrrowohrvogrdoc
pggugouodvdghzrxvbrhlwderdhqiohddqjdqrwqkquxwggurujbwkphoxdhgluldfhi
qhfvwhdrvubpfhokrqzfqkxddqjvbornghdofkrwlseqgldvlwijgogklqvosrvffxxy
kuosozzwyvgrxrrdgehhrddddlhhduvwirovxguqvvewqsqb

 

If you want to work on a computer, you can download the ciphertext as a text file here.

You can then use our Cipher Challenge Toolkit to help you decrypt it.

 

If you are interested in code breaking you might enjoy the Secondary Cipher Challenge.