That would entirely depend upon
how it's encrypted. The best approach (that I'm aware of) for transposition codes is to look for the most common character first. Generally, in English, that will be an 'e'. Repeating sequences are the next thing that I look for. If there are a lot of instances of ' w9t ' , for instance, it's reasonable to suspect that it represents ' the '. That's reinforced if you have already assigned 'e' to 't'. You then go back and replace every 'w' in the text with a 't', and every '9' with an 'h'. Your instance doesn't show word breaks, though, so it's a bit harder. Some patterns within other words then make themselves apparent, so you can exptrapolate what a particular word might be. Fill it out, and then copy the new letters that you get from that into the other words.
While I don't know, I assume that computer code-breaking takes the same basic approach, but is also capable of deducing whether or not some complex mathematical manipulation has been used in encoding it.
Another encryption method could have each letter stand for a number. The first two or three digits can stand for the page number in a pre-selected book, the next two the line number, the next two the word number, and the last 1 or 2 the letter number within that word. The interceptor would have to know the specific edition of the specific book in order to figure it out.
One that I came up with myself involves a simple transposition code ('a' = 'g', etc.), but every fifth word is English, interspersed with French, German, Spanish, Cockney rhyming slang, whatever. The tricky part is using words in each language that don't include 'special' characters not used in English. I also avoid using common words such as 'the', or 'it'.
I've never put it to the test, since I just thought it up while typing this post, but I suspect that it would be fairly effective unless attacked by a professional cryptographer.
