Defect Description: In part III,we are able to give numeric input also which is not encrypted properly.It gives output as the same input numeric string for any value of keys.
Steps to reproduce Cryptography->list of experiments->breaking the shift cipher->experiment
Expected result: Correct Decrypted string
ex-input=>0123
correct result for key=2 is 2345
Defect Description: In part III,we are able to give numeric input also which is not encrypted properly.It gives output as the same input numeric string for any value of keys.
Steps to reproduce Cryptography->list of experiments->breaking the shift cipher->experiment
Expected result: Correct Decrypted string ex-input=>0123 correct result for key=2 is 2345
Actual result: Same as input string screenshot![issue10](https://user-images.githubusercontent.com/44620448/54485572-25a4c280-48a1-11e9-8daf-5090c130ecb0.png)