Premium Only Content

Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
0:58
Prepping With KSG
3 years agoHerbs A Growin'!
40 -
1:04:57
The Rubin Report
1 hour agoCrowd Stunned by Trump’s Brutally Honest Remark at Charlie Kirk’s Funeral
24.4K18 -
LIVE
Grant Stinchfield
59 minutes agoThe Exploitation of Charlie Kirk's Death is Very Real
141 watching -
1:40:13
Nikko Ortiz
2 hours agoJapan's Prison System Is CRAZY...
7.84K4 -
LIVE
The Mel K Show
1 hour agoMORNINGS WITH MEL K Globalist Descend on America: Is it Time to Pull the Plug? 9-22-25
574 watching -
LIVE
The Shannon Joy Show
1 hour agoEpstein Cover Up - Kash Patel Has Names Of Epstein’s Pedophiles. Live Exclusive With Nick Bryant!
179 watching -
LIVE
LFA TV
15 hours agoLFA TV ALL DAY STREAM ! | MONDAY 9/22/25
4,648 watching -
9:08
Hollywood Exposed
20 hours agoMatthew McConaughey Shocks ABC Host With Blunt Message to Democrats
442 -
1:01:18
VINCE
3 hours agoAre We Witnessing A Revival? | Episode 130 - 09/22/25
198K137 -
LIVE
Caleb Hammer
18 hours ago$426,000+ A Year On Pokémon | Financial Audit
85 watching