Premium Only Content
Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
5:35
Prepping With KSG
3 years agoDIY Backpacker Chili - Preparing Dehydrated Chili!
109 -
5:03:56
Illyes Jr Gaming
12 hours agoCall Of Duty Black Ops 7 LAUNCH DAY!!!!
3.69K -
LIVE
Drew Hernandez
20 hours agoTUCKER CLASHES W/ FBI, TRUMP PUSHES EPSTEIN DISCLOSURE AFTER HOAX CLAIM & IS MEGYN KELLY IN DANGER?
1,367 watching -
LIVE
Phyxicx
2 hours agoRumble Spartans Halo Night! - HMR#20 - 11/14/2025
58 watching -
LIVE
FusedAegisTV
1 day ago*NEW F2P MMORPG, SoulsLike/Action Game // Global LAUNCH - EN Servers 🔴 FUSEDAEGIS
169 watching -
3:31:00
Barry Cunningham
6 hours agoFOOD STAMPS FRAUD | STARBUCKS BARISTAS BIG MAD | MORE NEWS (AND NO REAL ESTATE!)
66.1K24 -
LIVE
Reidboyy
1 day ago $0.18 earned24/7 BO7 Camo Grind! Stream Doesn't End Until I Unlock EVERY Camo in Black Ops 7!
20 watching -
2:27:02
TheSaltyCracker
4 hours agoTucker Blows Up FBI ReeEEStream 11-14-25
78.5K144 -
LIVE
I_Came_With_Fire_Podcast
13 hours agoThe Private Equity Crisis | Oh SNAP, Massive Fraud | Reindustrialization
195 watching -
1:36:12
Glenn Greenwald
11 hours agoQ&A With Glenn: On the Epstein Emails; Chomsky's Friendship with Epstein; Differences Between Tucker Carlson and Nick Fuentes; the Babylon Bee's Attack on Megyn Kelly; and More | SYSTEM UPDATE #547
96.7K57