Encoding with keyword KEY
Input: Plaintext: HELLO WORLD Keyword: KEY Mode: Encode
Output: Ciphertext: RIJVS UYVJN (H+K=R, E+E=I, L+Y=J, L+K=V, O+E=S; space preserved; W+Y=U, O+K=Y, R+E=V, L+Y=J, D+K=N)
500+ fast, free tools. Most run in your browser only; Image & PDF tools upload files to the backend when you run them.
Encode and decode text using the Vigenère polyalphabetic substitution cipher with any keyword.
The Vigenère Cipher tool encodes and decodes text using the Vigenère polyalphabetic substitution cipher, in which the shift for each character is determined by the corresponding letter of a repeating keyword. For example, with keyword 'KEY': A is shifted by K (10), the next letter by E (4), the next by Y (24), and so on cyclically. Unlike the single-shift Caesar cipher, the Vigenère cipher uses multiple shifts, making frequency analysis harder. The tool shows the Vigenère table (Tabula Recta) for educational reference and highlights which row and column are used for each letter in the plaintext, making the cipher's mechanism visually clear.
Input: Plaintext: HELLO WORLD Keyword: KEY Mode: Encode
Output: Ciphertext: RIJVS UYVJN (H+K=R, E+E=I, L+Y=J, L+K=V, O+E=S; space preserved; W+Y=U, O+K=Y, R+E=V, L+Y=J, D+K=N)
Input: Ciphertext: RIJVS UYVJN Keyword: KEY Mode: Decode
Output: Plaintext: HELLO WORLD (Reverses the encoding by subtracting key letter values instead of adding.)
Input: Plaintext: ATTACKATDAWN Keyword: LEMON Mode: Encode
Output: Ciphertext: LXFOPVEFRNHR (Keyword cycles: LEMONLEMONLE; key repetition is what Kasiski examination exploits.)
Input: Plaintext: HELLO Keyword: XMCKL Mode: Encode
Output: Ciphertext: EQNVZ (When keyword length equals plaintext length and keyword is random, this is a one-time pad — provably unbreakable.)