Premium Only Content

Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
0:59
Prepping With KSG
3 years ago $0.04 earnedWalkie Talkies for Grown Ups! GMRS Radio in 60 Seconds!
57 -
LIVE
JuicyJohns
39 minutes ago🟢#1 REBIRTH PLAYER 10.2+ KD🟢
263 watching -
UPCOMING
Crypto Power Hour
59 minutes agoMaster Your Crypto, The Ultimate Wallet Guide
51 -
26:39
Producer Michael
19 hours agoMY $32,000 EMIRATES FIRST CLASS FLIGHT!
35.3K5 -
10:12
BlaireWhite
1 day agoWoke TikTokers Are SUPPORTING The Trans Shooter..
1.47K11 -
48:21
The Confessionals
20 hours agoPossessed by the Gods? The Truth About Avatars w/ Jonathan Cahn
10.3K6 -
36:34
The Finance Hub
17 hours ago $2.47 earnedBREAKING: BILL CLINTON'S EPSTEIN TIES JUST GOT RELEASED!!!
13.4K10 -
LIVE
BEK TV
23 hours agoTrent Loos in the Morning - 9/10/2025
200 watching -
LIVE
The Bubba Army
22 hours agoFeds STEP IN on Charlotte Stabbing Case - Bubba the Love Sponge® Show | 9/10/25
2,266 watching -
LIVE
FyrBorne
11 hours ago🔴Warzone M&K Sniping: An Old Meta Returns To Cut Down The Competition
51 watching