@phildo87

It's crazy how simple these can be but still be useful. Obviously this wouldn't last against a government but would be fun to do with friends.

@optioncoachjohn

To  take it up to a near impossible to decipher message, add a number to the key, say 3. Then with each letter deciphered, you count up 3 letters further on the alphabet and use that letter instead.

@universalscience360

Since pm of Pakistan Mr Khan ousted from office I have been searching and learning what is cipher and how to write it. I would like to say this video class on producing cipher is brilliant and very simple and perfectly coded.
Thank you to teach me cipher writing. šŸ‘ŒšŸ’

@mycroft_moriarty

There was a POW in Vietnam who used a lesson he recalled from his time in Boy Scouts to maintain encrypted communication with the other POWs captured with him, to keep everyone in contact, keep up morale, maintain chain of command, and more. It's really simple. It's a 5x5 grid (dropping C, though I'd drop K) so D is in row 1, column 4, so they'd knock once, then four times to communicate D. Personally I used a modified 6x6 grid to avoid both dropping letters, and adding 0-9. I've used it to communicate covertly on more occasions and in more ways than I'm willing to divulge but it's been a great lesson. This can be combined with all the tools Andrew has included here as well.

@ColdWarPrepper

Great explanation - thank you - very useful in post SHTF environment for vast majority of people.  As a retired 98B (Cryptanalyst) should one of my 98G's (Voice Intercept Operator) intercept this, I would do 2 things - 1. Letter Frequency Count - especially common digraphs or double letters  and/or 2. Crib drag - gosh do I use a lot of graph paper

@JoeMac1983

"BE SURE TO DRINK YOUR OVALTINE" šŸ˜‚

@dandaniel66

Love the way you explained it.was quiet easy to grasp.looking forward to more knowledge empowerment from you.Thank you Sir.

@Real_IanScott

This is similar in nature to a Caesar Cipher system, but using a Key Letter. Excellent, and simple to follow. Thanks for sharing!

@premiumtutors

Appreciate the great length that you go to deliver this content for free

@zarry252

omgggg i understand u! more than my teacher!!!

@squibmis8381

Omg ty so much for this Iā€™m so interested in all these stuff iMa show my friends and family to outsmart them haha

@CountofHazelview

This is to be used between friends only since any cryptologist can break it. Only a created codebook with same number of letters (4, for example), combined with an One Time Pad, has proved to be impossible to break. The codes than transformed into a cipher, provide an second layer of security.

@alvankarpas6245

Good stuff.  Keep it rolling...

@SunRebeLionShah

Thank you šŸ˜Š greetings from Tehran Iran

@WorldTravelerCooking

Also as a note, cypher security breaks down with message length as it is subject to statistical attacks.

@essenestephanie

Thanks for opening instructions. There must be a program in today's techno age where you upload an basic aap and it goes through the alphabet pulling the pattern and decrypt. say If the English, only 26 letters , so shouldn't be too hard. Gonna practise these technique with my little smart niece who would get a kick out of this.

@kalebbillig3472

This type of single encrypted message can easily be decoded without knowing the key letter by simply decoding the 26 possibilities and seeing which version actually makes sense plus or minus a key letter in the message

@morengothemoringapeople

Loved this video the most

@Windy3s

Best teaching ever thanks

@beachboardfan9544

You've got to know better cipher's than that, thats got to be the most crack-able cipher of all time!
Are most ciphers math based these days or is their still use for key letter ciphers or T9 ciphers?