Premium Only Content
Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
0:59
Prepping With KSG
3 years ago $0.04 earnedWalkie Talkies for Grown Ups! GMRS Radio in 60 Seconds!
63 -
1:31:56
Michael Franzese
19 hours agoWill NBA do anything about their Gambling Problems?
119K26 -
57:26
X22 Report
9 hours agoMr & Mrs X - The Food Industry Is Trying To Pull A Fast One On RFK Jr (MAHA), This Will Fail - EP 14
93K61 -
2:01:08
LFA TV
1 day agoTHE RUMBLE RUNDOWN LIVE @9AM EST
149K12 -
1:28:14
On Call with Dr. Mary Talley Bowden
7 hours agoI came for my wife.
27.9K33 -
1:06:36
Wendy Bell Radio
12 hours agoPet Talk With The Pet Doc
66.6K32 -
30:58
SouthernbelleReacts
3 days ago $9.08 earnedWe Didn’t Expect That Ending… ‘Welcome to Derry’ S1 E1 Reaction
45.5K10 -
13:51
True Crime | Unsolved Cases | Mysterious Stories
5 days ago $20.15 earned7 Real Life Heroes Caught on Camera (Remastered Audio)
61.5K17 -
LIVE
Total Horse Channel
18 hours ago2025 IRCHA Derby & Horse Show - November 1st
62 watching -
4:19
PistonPop-TV
6 days ago $8.18 earnedThe 4E-FTE: Toyota’s Smallest Turbo Monster
46.8K3