Premium Only Content

Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
0:35
Prepping With KSG
3 years agoSprouts in 7 Days!!!
46 -
25:20
The Chris Cuomo Project
23 hours agoChris Cuomo EXPOSES Lies Behind the Government Shutdown
5.52K31 -
21:03
Nate The Lawyer
1 day ago $1.65 earnedChicago Mayor Brandon Johnson Under Fire Over ‘Defund’ Remarks Amid Crime Concerns
6.2K8 -
8:05
MattMorseTV
16 hours ago $10.26 earnedSchumer’s SECRET AGENDA just got EXPOSED.
40.1K36 -
16:37
Robbi On The Record
10 hours ago $1.58 earnedThe Theater of Manufactured Outrage - When Left and Right Dance for the Same Puppet Master
4.59K3 -
14:31
Sponsored By Jesus Podcast
19 hours agoSATAN Knows Scripture Better Than You | Reading the Bible
6.66K2 -
2:50:36
Side Scrollers Podcast
18 hours agoMore Violent Attacks on Speakers + Hollywood DEMANDS “Free Speech” + More | Side Scrollers
14K16 -
17:31
GritsGG
14 hours agoDestoying Warzone Duos Lobby w/ Big Bob!
11.2K3 -
1:28:36
The HotSeat
14 hours agoAntifa Unmasked: Keyboard Warriors with No Courage
14.2K13 -
1:53:11
The Michelle Moore Show
17 hours ago'Why Is Gold & Silver Rising, Is Buying Silver A Good Option Right Now, Options of Getting Into The Market, and More' Guest, Dr. Mike Fuljenz: The Michelle Moore Show (Oct 2, 2025)
15.6K3