Running Key Cipher Tool
Encrypt and decrypt messages with a long non-repeating key text instead of a short repeated keyword.
TL;DR
- A running key cipher uses a long text as the key stream.
- The key should be at least as long as the alphabetic message.
- It is useful for studying Vigenere-style polyalphabetic ciphers.
- This tool processes text in your browser and preserves formatting by default.
How to Use the Running Key Cipher Tool
- Choose encrypt or decrypt.
- Paste the message into the text box.
- Paste a key passage with at least as many letters as the message.
- Copy the generated output or swap it back into the input for a round trip.
How Running Key Ciphers Work
A running key cipher is a polyalphabetic substitution cipher that uses a long source text as the key. It belongs to the same family as the Vigenere cipher, but it avoids repeating a short keyword across the message.
A running key is a text stream that supplies one key letter for each alphabetic message letter. Convert A-Z to 0-25, add the plaintext and key values modulo 26 to encrypt, and subtract the key value modulo 26 to decrypt.
A one-time pad is a stronger related idea because its key is random, used once, and as long as the message. The difference matters: ordinary book text is not random, so a running key cipher is mainly a historical and educational system rather than modern security. The distinction is summarized in the one-time pad reference.
History and Use Cases
Running key systems were attractive because a sender and receiver could use a shared book, newspaper column, or prepared passage instead of carrying a visibly artificial key sheet. A book cipher is a broader class of systems that also relies on a shared text, and its history overlaps with many text-based field ciphers; see the book cipher overview.
Today, running key ciphers are best used for cryptography lessons, puzzle design, historical demonstrations, and comparison with Vigenere, autokey, and one-time-pad systems. They should not be used for protecting sensitive data because natural-language key text leaks statistical patterns.
Worked Example
Key text: THEQUICKBROW
Ciphertext: TAXQWSCDERKJ
The first letter encrypts as A + T = T. The second encrypts as T + H = A modulo 26. The same key letters must be used in the same order to decrypt.