All these cipher methods can be operated by means of squares containing the various alphabets, cipher disks or arrangements of fixed and sliding alphabets. For example, this was the original cipher of Vigenere: ⏎ ⏎ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ⏎ B C D E F G H I J K L M N O P Q R S T U V W X Y Z A ⏎ C D E F G H I J K L M N O P Q R S T U V W X Y Z A B ⏎ D E F G H I J K L M N O P Q R S T U V W X Y Z A B C ⏎ E F G H I J K L M N O P Q R S T U V W X Y Z A B C D ⏎ F G H I J K L M N O P Q R S T U V W X Y Z A B C D E ⏎ G H I J K L M N O P Q R S T U V W X Y Z A B C D E F ⏎ H I J K L M N O P Q R S T U V W X Y Z A B C D E F G ⏎ I J K L M N O P Q R S T U V W X Y Z A B C D E F G H ⏎ J K L M N O P Q R S T U V W X Y Z A B C D E F G H I ⏎ K L M N O P Q R S T U V W X Y Z A B C D E F G H I J ⏎ L M N O P Q R S T U V W X Y Z A B C D E F G H I J K ⏎ M N O P Q R S T U V W X Y Z A B C D E F G H I J K L ⏎ N O P Q R S T U V W X Y Z A B C D E F G H I J K L M ⏎ O P Q R S T U V W X Y Z A B C D E F G H I J K L M N ⏎ P Q R S T U V W X Y Z A B C D E F G H I J K L M N O ⏎ Q R S T U V W X Y Z A B C D E F G H I J K L M N O P ⏎ R S T U V W X Y Z A B C D E F G H I J K L M N O P Q ⏎ S T U V W X Y Z A B C D E F G H I J K L M N O P Q R ⏎ T U V W X Y Z A B C D E F G H I J K L M N O P Q R S ⏎ U V W X Y Z A B C D E F G H I J K L M N O P Q R S T ⏎ V W X Y Z A B C D E F G H I J K L M N O P Q R S T U ⏎ W X Y Z A B C D E F G H I J K L M N O P Q R S T U V ⏎ X Y Z A B C D E F G H I J K L M N O P Q R S T U V W ⏎ Y Z A B C D E F G H I J K L M N O P Q R S T U V W X ⏎ Z A B C D E F G H I J K L M N O P Q R S T U V W X Y ⏎ The first horizontal alphabet is the alphabet of the plain text. Each substitution alphabet is designated by the letter at the left of a horizontal line. For example, if the key word is BAD, the second, first and fourth alphabets are used in turn and the word WILL is enciphered XIOM.🏁
# | Player | Time | Duration | Accuracy | WPM | pp | |
---|---|---|---|---|---|---|---|
1 | |||||||
2 | |||||||
3 | |||||||
4 | |||||||
5 | |||||||
6 | |||||||
7 | |||||||
8 | |||||||
9 | |||||||
10 |
All these cipher methods can be operated by means of squares containing the various alphabets, cipher disks or arrangements of fixed and sliding alphabets. For example, this was the original cipher of Vigenere: ⏎ ⏎ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ⏎ B C D E F G H I J K L M N O P Q R S T U V W X Y Z A ⏎ C D E F G H I J K L M N O P Q R S T U V W X Y Z A B ⏎ D E F G H I J K L M N O P Q R S T U V W X Y Z A B C ⏎ E F G H I J K L M N O P Q R S T U V W X Y Z A B C D ⏎ F G H I J K L M N O P Q R S T U V W X Y Z A B C D E ⏎ G H I J K L M N O P Q R S T U V W X Y Z A B C D E F ⏎ H I J K L M N O P Q R S T U V W X Y Z A B C D E F G ⏎ I J K L M N O P Q R S T U V W X Y Z A B C D E F G H ⏎ J K L M N O P Q R S T U V W X Y Z A B C D E F G H I ⏎ K L M N O P Q R S T U V W X Y Z A B C D E F G H I J ⏎ L M N O P Q R S T U V W X Y Z A B C D E F G H I J K ⏎ M N O P Q R S T U V W X Y Z A B C D E F G H I J K L ⏎ N O P Q R S T U V W X Y Z A B C D E F G H I J K L M ⏎ O P Q R S T U V W X Y Z A B C D E F G H I J K L M N ⏎ P Q R S T U V W X Y Z A B C D E F G H I J K L M N O ⏎ Q R S T U V W X Y Z A B C D E F G H I J K L M N O P ⏎ R S T U V W X Y Z A B C D E F G H I J K L M N O P Q ⏎ S T U V W X Y Z A B C D E F G H I J K L M N O P Q R ⏎ T U V W X Y Z A B C D E F G H I J K L M N O P Q R S ⏎ U V W X Y Z A B C D E F G H I J K L M N O P Q R S T ⏎ V W X Y Z A B C D E F G H I J K L M N O P Q R S T U ⏎ W X Y Z A B C D E F G H I J K L M N O P Q R S T U V ⏎ X Y Z A B C D E F G H I J K L M N O P Q R S T U V W ⏎ Y Z A B C D E F G H I J K L M N O P Q R S T U V W X ⏎ Z A B C D E F G H I J K L M N O P Q R S T U V W X Y ⏎ The first horizontal alphabet is the alphabet of the plain text. Each substitution alphabet is designated by the letter at the left of a horizontal line. For example, if the key word is BAD, the second, first and fourth alphabets are used in turn and the word WILL is enciphered XIOM.🏁