Jay and Viru

All submissions for this problem are available.
Jay and Viru want to communicate with each other in the battlefield while fighting against Gabbar. They decide to make a simple cryptographic system so that the evil Gabbar does not easily decipher what they are trying to communicate. Jay's job was to develop the encryption algorithm and Viru was to develop the decryption one. Although Jay did his job, Viru is too busy romancing with Basanti. You, being Viru's close friend have to develop the decryption algorithm for him.
The encryption is done as follows:
We shall assume that inputs letters to be encrypted consists of lowercase characters (az) and one or more white spaces. Also whenever we refer to the term "alphabet", we always mean English Alphabet (consisting of letters az). Jay's encryption algorithm uses a substitution cipher (where we replace each letter of the alphabet by some other letter of the alphabet) to encrypt.
Represent each letter of the alphabet by a number in this way – a > 0, b> 1,..., z > 25. If a letter is shifted by n places means that it is replaced by another letter which precedes (n < 0) or succeeds (n > 0) the given letter by n places (we go back to a in case we need to go beyond z). In case of inversion, we exchange the mapping of letters in this way – the mapping of A is now the mapping of Z and vice versa, the mapping of B is now the mapping of Y and vice versa, and so on.
Initially Jay and Viru decide upon a common word (called a key) which they would use to encrypt the text (The original text is called plaintext and the encrypted text is called ciphertext). Then the entire text (including spaces  assume there will be no leading or trailing spaces) is divided into groups of size k, where k is the length of the key. Then write the key under the groups  letter by letter. Now the first floor (k/2) letters of the plaintext under each group are shifted and inverted corresponding to the letter below it. For instance if in a group the letter a is below the letter k, k will be shifted by a, i.e. 0 places and then inverted. While the remaining letters of the group are simply shifted. Note that the shifting and inversion functions are done on letters only  white space is not encrypted. Use the above stuffs to create a decrypting algorithm.
Input
The first line of the input would consist a number T indicating the number of test cases. The next line contains a string which would be used as a key for each of the coming test cases. T test cases then follow. Each test case consists of a single line containing the cipher text.
Output
For each test case the output would consist of a single line containing the decrypted text.
Example
Input:
1
tiger
ldusf lrmcp
Output:
hello world
Explanation:
Here I shall explain how “hello world” was encrypted to form “ldusf lrmcp”. The length of the key (tiger) is 5. Divide the plain text into groups of length 5 each. The first such group is “hello”. “h” is now shifted by “t” places, i.e. 19 places and then inverted i.e. the letter corresponding to “h” now would be the letter corresponding to “s” (on applying inversion – make a table and see) which in this case is “l”. Similarly for “e”, it is “d” on shifting and inversion. The remaining three letters “l”, “l” and “o” are simply shifted which is easy to calculate. The output would be of a similar format to input – it would have spaces in the same location as the input.
The problem now asks you to build a decrypting algorithm based on the encrypting strategy described above
Input Constraints
T<=150, size of the input cipher text <= 3500 words
Author:  pankajb64 
Tags  pankajb64 
Date Added:  9022012 
Time Limit:  0.1 sec 
Source Limit:  50000 Bytes 
Languages:  C, CPP14, JAVA, PYTH, PYTH 3.5, CS2, GO, NODEJS, BF 
Comments
 Please login at the top to post a comment.
SUCCESSFUL SUBMISSIONS
Fetching successful submissions
HELP
If you are still having problems, see a sample solution here. 