Saturday, September 10, 2011

Make A Cipher: The Key

How to Encrypt a Key Cipher

Step 1
Choose a word to be your KEY word. Make sure the word you select has at least five or six letters in it and has no repeating letters. For example the word APPLE will not work with this cipher because there are two P's in the word. In our example, we will use the word MAPLE for our key.

Step 2
Write the Key word on a piece of paper. Leave a little bit of space between each letter as you write down each letter of your Key.

Next, draw a column under each letter of the Key word.

Step 3
Fill in the columns by writing your PLAINTEXT message one letter at a time.

Any empty spaces should be filled in with a NULL. A NULL is usually represented by the letter X.

Step 4
Rewrite the columns so that the letters in your Key word are in alphabetical order.

In our example, the word MAPLE will be rearranged to read AELMP.

Step 5
To see your encrypted message, copy the letters in each column from top to bottom, but DO NOT include the letters in the Key word.

You have successfully created a KEY CIPHER!

How to Decrypt a Key Cipher

Step 1
Find out what the KEY word is from the person who sent you the message. Write the letters from the Key word in alphabetical order on a piece of paper.

Draw a column under each letter of the Key word.

Step 2
Starting under the letter A and writing from left to right, fill in the grid with the letters from the ciphertext.

Step 3 
Once the grid is filled in, rearrange the columns so the Key word is spelled out correctly. Reading from left to right, you should be able to see the plaintext message.

You have successfully deciphered a KEY CIPHER!


Post a Comment

Share our post if you like it..

Related Posts Plugin for WordPress, Blogger...

IP info



study (19) education (18) coding (11) Codes (9) ciphers (9) cryptology (9) CRYPTOGRAPHY (8) Hacking Tutorials (5) Ethical hacker/hacking (4) Exploits and Incident Handling (4) HACKING WINDOWS (4) Make A Cipher (4) Windows (4) password breakers/crackers (4) Dictionary (3) Ebook (3) Facebook (3) Facebook Emoticons (3) Google Dork (3) Google Hacks (3) facebook symbols (3) php hack (3) tools (3) ASCII art (2) Facebook Animated Gif Image Status (2) GRE (2) GRE Dictionary (2) Hack a Website (2) IELTS (2) Java: A Beginner's Guide (2) Password Cracking (2) Password Recovery (2) SOCIAL ENGINEERING TOOLKIT (2) Session hijacking (2) find the vulnerability (2) java (2) password-auditing (2) password-cracker (2) php (2) Abel (1) Backtrack 5 (1) Barron’s GRE word list (1) Breaking Ciphers (1) CIPHERTEXT (1) CRYPTANALYSIS (1) Caesar's Shift Cipher (1) Cain (1) Cain and Abel (1) Crypters Binders RC4 (1) DOS (1) Facebook Chat Text Generator (1) Fast leech generator (1) Hacking Tools (1) HconSTF (1) List of best anonymizers (1) Make fake virus (1) Number Shift Cipher (1) One Pig's Pen (1) RFI (1) Remote file inclusion (1) SEO (1) SQL injection (1) Security 504 Hacker Techniques (1) Steal/trace ip (1) The Key (1) The Rail Fences (1) Toefl (1) Uses of proxy server (1) Virus (1) Vocabulary Word List (1) Winding Way Cipher (1) blog tips (1) brute force (1) brute forcing. (1) brutus (1) brutus-aet2 (1) (1) brutus-password-cracker (1) bypass web-filters (1) chat (1) command prompt (1) cookie stealing (1) crackers (1) e (1) fast download (1) hacking-software (1) hot file (1) improve site (1) ip catcher (1) ip tracker (1) leech (1) leecher (1) list of proxy servers (1) mail (1) mega upload (1) mobile (1) network-sniffing (1) rapid share (1) regular download link into premium (1) serial keys 94fbr (1) symbols (1) th3j35t3r's DOS tool (1)



☁ Partners Link Cloud ☁