Premium Only Content

Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
0:59
Prepping With KSG
3 years ago $0.04 earnedWalkie Talkies for Grown Ups! GMRS Radio in 60 Seconds!
57 -
59:34
The White House
3 hours agoPress Secretary Karoline Leavitt Briefs Members of the New Media, Apr. 28, 2025
6.35K11 -
31:40
CryptoWendyO
55 minutes agoU.S. BANKS ADOPTING XRP?! (URGENT Updates For LINK HBAR SOL)
-
1:02:16
BitLab Academy
1 hour agoInstitutions Stacking Bitcoin! Altcoins Set To Pump | Key Crypto Targets & Signals
133 -
1:02:31
Timcast
2 hours agoMASSIVE Power Outages His Europe, CHAOS ERUPTS, Strange Atmospheric PHENOMENON Blamed
119K124 -
1:57:56
Steven Crowder
5 hours agoThere is No Trump Buyer's Remorse; Why the New Poll Numbers are a Psyop
308K226 -
DVR
Nerdrotic
7 hours ago $1.50 earnedNerdrotic Nooner 482
22.9K1 -
1:57:44
The Charlie Kirk Show
2 hours ago100 Days of Wins + Vance Interview + Tim Pool, WH Reporter | Vance, Sen. Scott, Pool | 4.24.25
38.9K4 -
LIVE
The Dana Show with Dana Loesch
2 hours agoPRESIDENT TRUMP'S FIRST 100 DAYS | The Dana Show LIVE on Rumble!
529 watching -
5:39
Talk Nerdy Sports - The Ultimate Sports Betting Podcast
1 hour ago4/28/25 - Monday Massacre: Vasil’s 10 Kill Shots + PrizePicks Flamethrower 🔥📈
10.4K