What area of 'cybersecurity' would I be finding myself breaking substitution ciphers based on wingdings in?<p>I work in the information security industry, and I feel like I'm missing something but I really have to ask what these are relevant to.<p>Cryptography, which this appears to be a reduced form of is mostly tangential and very nuanced relative to the ciphers in this challenge. I often feel my line of work is grossly misrepresented by dizzying fields of esoteric numbers and references to ancient cryptography when I'm happy to find myself many of my days engrossed in the security characteristics of some powerful technology used right now in the real world.<p>I moved from engineering to security, but if this was my only interaction with security, I'm not sure I'd have been interested.<p>Edit: if you're interested in real crypto challenges, try <a href="http://cryptopals.com/" rel="nofollow">http://cryptopals.com/</a> and read Cryptography Engineering, which is a wonderful read that goes over not only the cryptography but also the principles common across the many specialisations of the infosec industry