the row length the same number of characters as the keyword. Because our first keyword,
, is six characters, the row length of our message will be six, as is shown in the image onthe previous page.
As you can see, the last row of the message only hasthree letters (L,E,E). In the event of any spaces in the
message, you fill those spaces with “nulls”, or randomletters. In this example we will use the letter “X” as
Step 2 - Columns:
Now that your message is written out it is time to find the order that your columns will be shiftedby in order to jumble the message. We find the order of thecolumns by using the keyword and the alphabeticalordering of its letters.
is the first letter so it is designated asnumber one with the number placed above it. Since
isnext in the alphabet, it receives a two. Continue this untileach column has a number.In the event that your keyword has more than one of the same letters, they are numbered thesame however their order goes from left to right.
Step 3 - First Encryption:
In this step we will see our message become cipher text. In order to do this you will want towrite out each column in the order they have been designated in the last step.
If we write out each column in the correctorder we get the message:
“FSX TUL EDEOFX YUX HNE”.
Now that you have thefirst iteration of your cipher text, it is timeto jumble it again using your secondkeyword.
Step 4 - Second Placement:
To encrypt your message a second time you will use the samesteps as before, however with the keyword
. As shown in the
image to the right, you take your cipher text of: “
HNE” and write it out row by row underneath the word