Atbash Cipher - Ancient Encryption Tool
Free Online Tool

Running Key Cipher Tool

Encrypt and decrypt messages with a long non-repeating key text instead of a short repeated keyword.

TL;DR

  • A running key cipher uses a long text as the key stream.
  • The key should be at least as long as the alphabetic message.
  • It is useful for studying Vigenere-style polyalphabetic ciphers.
  • This tool processes text in your browser and preserves formatting by default.

How to Use the Running Key Cipher Tool

  1. Choose encrypt or decrypt.
  2. Paste the message into the text box.
  3. Paste a key passage with at least as many letters as the message.
  4. Copy the generated output or swap it back into the input for a round trip.

How Running Key Ciphers Work

A running key cipher is a polyalphabetic substitution cipher that uses a long source text as the key. It belongs to the same family as the Vigenere cipher, but it avoids repeating a short keyword across the message.

A running key is a text stream that supplies one key letter for each alphabetic message letter. Convert A-Z to 0-25, add the plaintext and key values modulo 26 to encrypt, and subtract the key value modulo 26 to decrypt.

A one-time pad is a stronger related idea because its key is random, used once, and as long as the message. The difference matters: ordinary book text is not random, so a running key cipher is mainly a historical and educational system rather than modern security. The distinction is summarized in the one-time pad reference.

History and Use Cases

Running key systems were attractive because a sender and receiver could use a shared book, newspaper column, or prepared passage instead of carrying a visibly artificial key sheet. A book cipher is a broader class of systems that also relies on a shared text, and its history overlaps with many text-based field ciphers; see the book cipher overview.

Today, running key ciphers are best used for cryptography lessons, puzzle design, historical demonstrations, and comparison with Vigenere, autokey, and one-time-pad systems. They should not be used for protecting sensitive data because natural-language key text leaks statistical patterns.

Worked Example

Plaintext: ATTACKATDAWN
Key text: THEQUICKBROW
Ciphertext: TAXQWSCDERKJ

The first letter encrypts as A + T = T. The second encrypts as T + H = A modulo 26. The same key letters must be used in the same order to decrypt.