Secure Letter Encryption

If you need to contact me using your private key we have provided in conversations.
Here are instructions how you can encrypt and decrypt. Stay safe.

We are using so called "vigenere" cipher with some own rules.

Cipher Table

This is our table you need to use to encrypt and decrypt:

   | 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-------------------------------------------------------------------------------
0  | 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1  | 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0
2  | 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1
3  | 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2
4  | 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3
5  | 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4
6  | 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5
7  | 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6
8  | 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7
9  | 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8
A  | A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9
B  | B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A
C  | C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B
D  | D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C
E  | E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D
F  | F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E
G  | G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F
H  | H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G
I  | I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H
J  | J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I
K  | K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J
L  | L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K
M  | M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L
N  | N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M
O  | O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N
P  | P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O
Q  | Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P
R  | R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q
S  | S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R
T  | T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S
U  | U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T
V  | V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U
W  | W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V
X  | X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W
Y  | Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X
Z  | Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y
 

Example for Encryption: 

Repeat the Keyword if necessary

Message: helloworld Keyword: zephyr

  1. Repeat the Keyword: Repeat the keyword "zephyr" to match the length of the message:

    Keyword: zephyrzeph

  2. Encrypt the Message: Use the Vigenère Cipher table above to encrypt each letter of the message with the corresponding letter from the repeated keyword. Remember to use both letters and numbers from the table.

    • h (plain) + z (keyword) = G (encrypted)
    • e (plain) + e (keyword) = S (encrypted)
    • l (plain) + p (keyword) = A (encrypted)
    • l (plain) + h (keyword) = 2 (encrypted)
    • o (plain) + y (keyword) =  M (encrypted)
    • w (plain) + r (keyword) = N (encrypted)
    • o (plain) + z (keyword) = N (encrypted)
    • r (plain) + e (keyword) = 5 (encrypted)
    • l (plain) + p (keyword) = A (encrypted)
    • d (plain) + h (keyword) = U (encrypted)

Encrypted Message: GSA2MNN5AU

So, the encrypted message for "helloworld" using the keyword "zephyr" and the Vigenère table with numbers is "GSA2MNN5AU."

Example for Decryption:

Repeat the Keyword if necessary

Message: GSA2MNN5AU Keyword: zephyr

  1. Repeat the Keyword: Repeat the keyword "zephyr" to match the length of the message:

    Keyword: zephyrzeph

  2. Decrypt the Message: Use the Vigenère Cipher table above to decrypt each letter of the message with the corresponding letter from the repeated keyword. Remember to use both letters and numbers from the table.

    • G (encrypted) + z (keyword) = H (decrypted)
    • S (encrypted) + e (keyword) = E (decrypted)
    • A (encrypted) + p (keyword) = L (decrypted)
    • 2 (encrypted) + h (keyword) = L (decrypted)
    • M (encrypted) + y (keyword) =  O (decrypted)
    • N (encrypted) + r (keyword) = W (decrypted)
    • N (encrypted) + z (keyword) = O (decrypted)
    • 5 (encrypted) + e (keyword) = R (decrypted)
    • A (encrypted) + p (keyword) = L (decrypted)
    • U (encrypted) + h (keyword) = D (decrypted)

Decrypted Message: helloworld

So, the encrypted message for "GSA2MNN5AU" using the keyword "zephyr" and the Vigenère table with numbers is "helloworld."

Comments

Popular posts from this blog

Impressum

Privacy