Premium Only Content
Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
5:35
Prepping With KSG
2 years agoDIY Backpacker Chili - Preparing Dehydrated Chili!
96 -
2:50:03
BlackDiamondGunsandGear
16 hours agoLIVE SHOW / CMMG/ DLD AFTER DARK
4.24K -
52:05
PMG
17 hours ago $1.80 earnedWhat Does Freedom Cost? Steven Solomon's On-the-Ground Documentary in Ukraine
19.8K5 -
9:45
RTT: Guns & Gear
18 hours ago $0.19 earned1000 Rounds Of Awesome: Radical Defense Mk1 Mod 1 Patrol Rifle
10.1K -
7:42
Bek Lover Podcast
18 hours agoInteresting Times with Bek Lover Podcast
7.55K -
1:02:27
Weberz Way
16 hours agoICE IS IN FULL FORCE, TRUMP 2.0 IN L.A., & FUNDING IS CUT OFF
5.47K3 -
11:49
Ethical Preparedness
19 hours agoThe Post Collapse Emergency Food That You Don't Know About - Prepper Skills
3.99K4 -
5:17
SeasonofMist
1 day agoVLTIMAS - Mephisto Manifesto (Official Music Video)
2.96K -
50:42
CutJibNewsletter
2 days agoThe Orange Mandela Delivers on Deliverance Episode!
2.54K4 -
25:30
SB Mowing
1 day agoFrom Overgrown to OVERJOYED - Busy Mom and her Kids can Enjoy the Yard Again
21K14