Premium Only Content

Hiding In Plain Sight - Ciphers Decrypted!
What if you had to move written information without services or electric? How would you keep your messages private? What if you couldn't use modern services in an emergency? Let's take a look at look at what classic ciphers (written code) are and discuss how we might use them. One of the best keyword based ciphers is Vigenere Square Cipher - as copied below from Wikipedia (give credit where it is due!).
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To use the Vigenère square to encrypt a message, a coder first chooses a keyword to use and then repeats it until it is the same length as the message to be encoded. If LEMON is the keyword, each letter of the repeated keyword will tell what cipher (what row) to use for each letter of the message to be coded. The cipher alphabet on the second row uses B for A and C for B etc. That is cipher alphabet 'B'. Each cipher alphabet is named by the first letter in it. For example, if the keyword is LEMON and the message to encode is ATTACKATDAWN, then the encoding is:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
-
0:38
Prepping With KSG
3 years agoHumming Birds Close Up with Slo Mo! #Shorts
55 -
LIVE
LFA TV
22 hours agoLFA TV ALL DAY STREAM - MONDAY 9/15/25
902 watching -
54:12
Donald Trump Jr.
2 hours agoCharlie's Vision. Our Future. | TRIGGERED Ep274
143K97 -
1:03:35
BonginoReport
4 hours agoKirk’s Alleged Killer Dating Hateful Transgender??? - Nightly Scroll w/ Hayley Caronia (Ep.134)
80.4K94 -
1:01:12
The Nick DiPaolo Show Channel
5 hours agoKirk Assassination Exposes Insane Left | The Nick Di Paolo Show #1793
50.7K19 -
1:48:38
The Mike Schwartz Show
4 hours agoTHE MIKE SCHWARTZ SHOW Evening Edition 09-15-2025
24.1K10 -
LIVE
LIVE WITH CHRIS'WORLD
5 hours agoLIVE WITH CHRIS'WORLD - They Just Created 1 Million Charlie Kirks
119 watching -
LIVE
Quite Frankly
7 hours agoStaggering Evil, Official Stories & Open Lines | Rich Baris 9/15/25
693 watching -
1:09:33
TheCrucible
5 hours agoThe Extravaganza! EP: 36 (9/15/25)
166K18 -
1:13:06
Candace Show Podcast
4 hours agoThey Are Lying About Charlie Kirk. | Candace Ep 235
101K443