Vigenère Cipher
Encrypt text with the key-based Vigenère cipher.
Only letters in the keyword are used as key characters — digits and symbols are ignored. The keyword repeats to cover the full length of the input.
The Vigenère cipher was once called "le chiffre indéchiffrable" but was broken in the 19th century. It is a historical and educational cipher — do not use it to protect sensitive data.
How to use Vigenère Cipher
What this tool does
The Vigenère Cipher tool encodes and decodes text using a repeating keyword. You type a keyword, choose encode or decode, and paste your text — the result appears in the output box immediately. Each letter of the input is shifted by an amount determined by the corresponding letter of the keyword: A shifts by zero positions, B by one, C by two, and so on up to Z which shifts by 25. When the keyword runs out, it loops back to its first character. Non-letter characters in the text — spaces, punctuation, numbers — pass through unchanged and do not move the keyword position forward, so the alignment between keyword and letters stays consistent.
If the keyword contains no letters at all, the tool displays a clear message and passes the text through unchanged, so you always know exactly what transformation was applied.
Why you might need it
The Vigenère cipher sits at the intersection of history and puzzle culture. It was described by Giovan Battista Bellaso in 1553 and later (incorrectly) attributed to Blaise de Vigenère. For three centuries it resisted widespread cracking and was known in France as “le chiffre indéchiffrable” — the undecipherable cipher. That mystique persists in puzzles and games today.
Escape room designers, ARG creators and puzzle writers use it frequently because the encoding process is systematic and reproducible, the keyword can be hidden as a separate clue, and the encoded text looks completely different from the original. A well-chosen keyword makes the output look convincingly random to casual inspection.
It also appears in cryptography courses as the canonical example of a polyalphabetic cipher — the step up from the single-shift Caesar cipher that defeated simple frequency analysis for centuries. If you are studying or teaching the history of cryptography, encoding and decoding real examples by hand or with this tool gives an immediate feel for how the cipher works and why it was considered strong.
How to use it
- Type your keyword into the keyword field. Any mix of letters works; only the letters themselves matter (digits and symbols are skipped).
- Select Encode if you are starting with plain text, or Decode if you have a Vigenère-encoded message and know the keyword.
- Type or paste your text into the input box.
- Read the result in the output box — it updates in real time with every character you type and every change to the keyword.
- Click Copy output to copy the result, or Clear to start over. Load sample fills in the classic “LEMON” keyword and a sample sentence.
Common pitfalls
The most important requirement is keyword agreement. Encoder and decoder must use the exact same keyword. If even one letter differs, the decoded output will be garbled. When designing a puzzle, make the keyword retrievable from the puzzle itself rather than depending on memory.
A second trap is forgetting which mode you are in. If you encode a message and then try to decode the plain text instead of the encoded output, you will get a doubly-scrambled result. Switch to Decode only after encoding, and paste the encoded output — not the original.
Keep in mind that the keyword length matters for security (in an educational sense). A very short keyword — say, a single letter — produces a result identical to a Caesar cipher, because every letter is shifted by the same amount. Longer keywords produce more varied shifting and were historically harder to crack.
Tips and advanced use
Choose a keyword that is memorable but not obvious. A random sequence of letters is harder for a human to guess, but a word with personal significance to both parties in a puzzle is easier to remember.
Non-letter characters in the plain text are useful separators. A message like “THE FOX” will produce encoded output where the space is preserved in position, making the word boundary visible. If you want to hide structure, remove spaces before encoding and restore them later — though for puzzles, visible word boundaries often make the challenge more tractable and enjoyable.
Because the tool runs entirely in your browser, there is no risk in pasting actual text into it to experiment. Nothing is stored or transmitted.
Frequently asked questions
Is my text or keyword sent to a server?
What is the Vigenère cipher?
How do I decode a Vigenère-encoded message?
Is the Vigenère cipher secure?
What counts as a keyword letter?
Related tools
Caesar Cipher
Encrypt and decrypt text with a custom Caesar shift.
ROT13 Cipher
Encode and decode text with the classic ROT13 cipher.
Atbash Cipher
Encode and decode text with the Atbash cipher.
Bacon Cipher
Hide messages with the classic Bacon cipher.
HMAC Generator
Generate HMAC signatures with the Web Crypto API.
Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes.