1. The document provides instructions for 6 encryption tasks: preparing a message for encryption, encrypting a message with Caesar cipher using a shift of 3, decrypting a message encrypted with Caesar cipher of unknown shift, finding a hidden message in text about cryptology, decoding a word using a reordered list of items, and encrypting a message with a one-time pad cipher using a key related to a European educational project. 2. It explains that Caesar cipher replaces each letter with one 3 positions further in the alphabet and gives an example of decrypting a message using a table of all possible shifts. 3. It also explains that steganography hides the very existence of a message and one-time pad cipher is