Secure Letter Encryption
If you need to contact me using your private key we have provided in conversations.
Here are instructions how you can encrypt and decrypt. Stay safe.
We are using so called "vigenere" cipher with some own rules.
Cipher Table
| 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-------------------------------------------------------------------------------
0 | 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 | 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0
2 | 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1
3 | 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2
4 | 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3
5 | 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4
6 | 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5
7 | 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6
8 | 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7
9 | 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8
A | A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9
B | B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A
C | C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B
D | D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C
E | E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D
F | F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E
G | G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F
H | H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G
I | I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H
J | J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I
K | K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J
L | L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K
M | M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L
N | N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M
O | O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N
P | P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O
Q | Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P
R | R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q
S | S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R
T | T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S
U | U V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T
V | V W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U
W | W X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V
X | X Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W
Y | Y Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X
Z | Z 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y
Example for Encryption:
Repeat the Keyword if necessary
Message: helloworld Keyword: zephyr
Repeat the Keyword: Repeat the keyword "zephyr" to match the length of the message:
Keyword: zephyrzeph
Encrypt the Message: Use the Vigenère Cipher table above to encrypt each letter of the message with the corresponding letter from the repeated keyword. Remember to use both letters and numbers from the table.
- h (plain) + z (keyword) = G (encrypted)
- e (plain) + e (keyword) = S (encrypted)
- l (plain) + p (keyword) = A (encrypted)
- l (plain) + h (keyword) = 2 (encrypted)
- o (plain) + y (keyword) = M (encrypted)
- w (plain) + r (keyword) = N (encrypted)
- o (plain) + z (keyword) = N (encrypted)
- r (plain) + e (keyword) = 5 (encrypted)
- l (plain) + p (keyword) = A (encrypted)
- d (plain) + h (keyword) = U (encrypted)
Encrypted Message: GSA2MNN5AU
So, the encrypted message for "helloworld" using the keyword "zephyr" and the Vigenère table with numbers is "GSA2MNN5AU."
Example for Decryption:
Repeat the Keyword if necessary
Message: GSA2MNN5AU Keyword: zephyr
Repeat the Keyword: Repeat the keyword "zephyr" to match the length of the message:
Keyword: zephyrzeph
Decrypt the Message: Use the Vigenère Cipher table above to decrypt each letter of the message with the corresponding letter from the repeated keyword. Remember to use both letters and numbers from the table.
- G (encrypted) + z (keyword) = H (decrypted)
- S (encrypted) + e (keyword) = E (decrypted)
- A (encrypted) + p (keyword) = L (decrypted)
- 2 (encrypted) + h (keyword) = L (decrypted)
- M (encrypted) + y (keyword) = O (decrypted)
- N (encrypted) + r (keyword) = W (decrypted)
- N (encrypted) + z (keyword) = O (decrypted)
- 5 (encrypted) + e (keyword) = R (decrypted)
- A (encrypted) + p (keyword) = L (decrypted)
- U (encrypted) + h (keyword) = D (decrypted)
Decrypted Message: helloworld
So, the encrypted message for "GSA2MNN5AU" using the keyword "zephyr" and the Vigenère table with numbers is "helloworld."
Comments
Post a Comment