Premium Only Content
Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
0:35
Prepping With KSG
3 years agoSprouts in 7 Days!!!
48 -
LIVE
Lofi Girl
3 years agolofi hip hop radio 📚 - beats to relax/study to
199 watching -
55:46
PandaSub2000
11 hours agoBeyond Good & Evil | ULTRA BEST AT GAMES (HD Edited Replay)
1452 -
3:11:36
FreshandFit
10 hours agoAlex Stein & Madison Cawthorn With Miami Latinas
195K56 -
2:00:32
Badlands Media
13 hours agoOnlyLands Ep. 31: The Post-GART Hangover Show
65K36 -
LIVE
The Rabble Wrangler
12 hours agoBattlefield "Deputy Games" with The Best in the West!
807 watching -
2:03:43
TimcastIRL
11 hours agoTrump Declares Antifa FOREIGN Terrorists, It Has Begun | Timcast IRL
235K120 -
2:56:34
Parallel 8 Media
5 hours agoFriday Night Huddle - Ep 31- Julie Donuts, Rachel & Betsy
31K2 -
5:03:56
Illyes Jr Gaming
16 hours agoCall Of Duty Black Ops 7 LAUNCH DAY!!!!
19K -
4:21:52
Drew Hernandez
1 day agoTUCKER CLASHES W/ FBI, TRUMP PUSHES EPSTEIN DISCLOSURE AFTER HOAX CLAIM & IS MEGYN KELLY IN DANGER?
41.8K19