ToolJutsu
All tools
Text Tools

Vigenère Cipher

Encrypt text with the key-based Vigenère cipher.

Only letters in the keyword are used as key characters — digits and symbols are ignored. The keyword repeats to cover the full length of the input.

The Vigenère cipher was once called "le chiffre indéchiffrable" but was broken in the 19th century. It is a historical and educational cipher — do not use it to protect sensitive data.

Processed on your device. We never see your files.

How to use Vigenère Cipher

What this tool does

The Vigenère Cipher tool encodes and decodes text using a repeating keyword. You type a keyword, choose encode or decode, and paste your text — the result appears in the output box immediately. Each letter of the input is shifted by an amount determined by the corresponding letter of the keyword: A shifts by zero positions, B by one, C by two, and so on up to Z which shifts by 25. When the keyword runs out, it loops back to its first character. Non-letter characters in the text — spaces, punctuation, numbers — pass through unchanged and do not move the keyword position forward, so the alignment between keyword and letters stays consistent.

If the keyword contains no letters at all, the tool displays a clear message and passes the text through unchanged, so you always know exactly what transformation was applied.

Why you might need it

The Vigenère cipher sits at the intersection of history and puzzle culture. It was described by Giovan Battista Bellaso in 1553 and later (incorrectly) attributed to Blaise de Vigenère. For three centuries it resisted widespread cracking and was known in France as “le chiffre indéchiffrable” — the undecipherable cipher. That mystique persists in puzzles and games today.

Escape room designers, ARG creators and puzzle writers use it frequently because the encoding process is systematic and reproducible, the keyword can be hidden as a separate clue, and the encoded text looks completely different from the original. A well-chosen keyword makes the output look convincingly random to casual inspection.

It also appears in cryptography courses as the canonical example of a polyalphabetic cipher — the step up from the single-shift Caesar cipher that defeated simple frequency analysis for centuries. If you are studying or teaching the history of cryptography, encoding and decoding real examples by hand or with this tool gives an immediate feel for how the cipher works and why it was considered strong.

How to use it

  1. Type your keyword into the keyword field. Any mix of letters works; only the letters themselves matter (digits and symbols are skipped).
  2. Select Encode if you are starting with plain text, or Decode if you have a Vigenère-encoded message and know the keyword.
  3. Type or paste your text into the input box.
  4. Read the result in the output box — it updates in real time with every character you type and every change to the keyword.
  5. Click Copy output to copy the result, or Clear to start over. Load sample fills in the classic “LEMON” keyword and a sample sentence.

Common pitfalls

The most important requirement is keyword agreement. Encoder and decoder must use the exact same keyword. If even one letter differs, the decoded output will be garbled. When designing a puzzle, make the keyword retrievable from the puzzle itself rather than depending on memory.

A second trap is forgetting which mode you are in. If you encode a message and then try to decode the plain text instead of the encoded output, you will get a doubly-scrambled result. Switch to Decode only after encoding, and paste the encoded output — not the original.

Keep in mind that the keyword length matters for security (in an educational sense). A very short keyword — say, a single letter — produces a result identical to a Caesar cipher, because every letter is shifted by the same amount. Longer keywords produce more varied shifting and were historically harder to crack.

Tips and advanced use

Choose a keyword that is memorable but not obvious. A random sequence of letters is harder for a human to guess, but a word with personal significance to both parties in a puzzle is easier to remember.

Non-letter characters in the plain text are useful separators. A message like “THE FOX” will produce encoded output where the space is preserved in position, making the word boundary visible. If you want to hide structure, remove spaces before encoding and restore them later — though for puzzles, visible word boundaries often make the challenge more tractable and enjoyable.

Because the tool runs entirely in your browser, there is no risk in pasting actual text into it to experiment. Nothing is stored or transmitted.

Frequently asked questions

Is my text or keyword sent to a server?
No. All encoding and decoding happens inside your browser. Neither the text nor the keyword is uploaded, logged or stored anywhere. You can verify this with the Network tab in your browser's developer tools — there are no outgoing requests.
What is the Vigenère cipher?
The Vigenère cipher is a polyalphabetic substitution cipher that uses a repeating keyword as its key. Each letter in the plain text is shifted by an amount determined by the corresponding letter in the keyword — A shifts by 0, B by 1, and so on up to Z which shifts by 25. When the keyword runs out, it repeats from the beginning. Because each letter in the message can be shifted by a different amount, frequency analysis (the main tool for cracking simpler substitution ciphers) is harder to apply.
How do I decode a Vigenère-encoded message?
Switch to Decode mode, enter the same keyword that was used to encode the message, and paste the encoded text. The tool reverses each letter's shift using the keyword, recovering the original. Both encoder and decoder must use exactly the same keyword.
Is the Vigenère cipher secure?
No, not by modern standards. The cipher was broken definitively in the 19th century by Charles Babbage and Friedrich Kasiski, who showed that statistical analysis of repeated patterns in the ciphertext reveals the keyword length — after which each position can be attacked independently like a Caesar cipher. Use it for puzzles and learning, never to protect anything that actually needs to stay private.
What counts as a keyword letter?
Only the 26 basic Latin letters A–Z matter in the keyword. Digits, spaces and punctuation in the keyword are simply skipped, and the next letter is used instead. The keyword 'L3MON!' behaves identically to 'LMON' — only the four letters are used.

Related tools