Encrypt or decrypt text using the classic polyalphabetic substitution algorithm. Ideal for cryptography learning and testing.
Click generate button to start

PX to REM Converter
A bidirectional PX to REM converter for front-end developers and designers, featuring customizable root font sizes.
Lorem Ipsum Generator
Quickly generate Latin placeholder text for design and typography. Supports paragraphs, sentences, and words.

Caesar Cipher Encoder & Decoder
Easily encrypt and decrypt text using the Caesar cipher (shift cipher) with custom alphabets and shift values online.

SSL FREAK Vulnerability Checker
Scan a specified domain for the SSL FREAK vulnerability (CVE-2015-0204) and assess TLS/SSL security configuration risks.

JSON to PropTypes Converter
Automatically convert JSON data structures into React PropTypes validation code to boost your front-end development efficiency.
When you need a classic encryption method that is more secure than simple letter substitution, the Vigenère cipher provides a reliable solution. It is a polyalphabetic substitution cipher that uses a keyword composed of letters to cyclically select different Caesar shift alphabets to encrypt each character of the plaintext. This outputs a ciphertext that is highly resistant to simple frequency analysis. The basic processing unit of the Vigenère cipher is the standard alphabet (A-Z). Its core strength lies in using a key to expand into multiple substitution alphabets, effectively countering the primary weakness of monoalphabetic substitution.
Can the Vigenère cipher key contain numbers?
No. A standard Vigenère cipher key consists exclusively of letters. The tool will automatically ignore numbers and symbols in your input. For example, entering "Key123!" will be processed simply as "KEY".
Why is the Vigenère cipher considered insecure today?
Although historically known as "le chiffre indéchiffrable" (the indecipherable cipher), analysis methods like the Kasiski examination developed in the 19th century can effectively crack it. It cannot withstand brute-force attacks and statistical analysis by modern computers. It is strictly suitable for educational purposes and hobbyist research, and must never be used for actual secure communication.
Please ensure that the exact same key is used for both encryption and decryption. The tool typically processes only A-Z letters; other characters (like spaces and punctuation) may be preserved as is or ignored, so please be mindful of your input text's formatting. This tool is intended for educational purposes only—do not use it in any scenario requiring real-world data security.
To deeply understand the principles of polyalphabetic substitution, we recommend trying the classic "Index of Coincidence" decryption exercise. You can first encrypt an English text using a short key (like "KEY") to observe how the ciphertext letter frequency distribution is "smoothed." Then, try encrypting with a long, random key (like "XQJFLB") to compare the security differences between the two ciphertexts. A typical example: when the plaintext "HELLO" is encrypted using the key "KEY", the process is H(K)->R, E(E)->I, L(Y)->J, L(K)->V, O(E)->S, resulting in the ciphertext "RIJVS". Understanding this letter-by-letter modulo 26 addition process is the key to mastering how the cipher works.