Since the EECS was leaked by an impostor among the elephants, they decided to reinforce the rule by adding one more step.
The rules of EECS-2 are as follows:
s
by k
positions in the alphabetical order. For example, Reverse the entire string. For example,
"ELEPHANT" becomes "TNAHPELE".
To prove that you are not the impostor, please encrypt the string of length 5 and a shift distance k
using EECS-2.
You can try solving the problem without needing to know the exact ASCII values of the letters.
The first line contains a single integer k
.
1 ≤ k
≤ 26
The second line contains a single string s
.
It is guaranteed that all characters in s
are lowercase letters and the length of the string is 5.
Output the encrypted string.
Note that you do NOT need to print '\n' at the end of the output.