This is the third in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a transposition cipher called the rail fence cipher, also known as the zig zag cipher. It explains how this method can be used to scramble the letters in a plain text message to generate cipher text. It also explains how the rail fence cipher can be used with different keys. The video includes a examples you can try to encrypt and decrypt yourself.