This library is built in the open.
If you spot an error, have a suggestion, or just want to say hello — we’d love to hear from you.

you should place, and vice versa, if the consonant b occurs to be written, you should write the vowel a instead of b; and so in the remaining modes, which for the sake of variation are also inverted by retrograde movement meaning the substitution is reversed or flipped, namely: for a write g, for e write f, for i write d—which, as it is the middle one, always remains fixed and will never change.
A schematic cryptographic diagram shows three vertical columns of letter substitution pairs enclosed in curly braces, with the middle pairs numbered 1, 2, and 3 to designate cipher modes. These represent the "inverted" versions of the keys shown on the previous page.
Now, for example, if the word Omnipotens Latin: "Almighty" is to be written, and this is done by the first mode, it is written as Fmndpftcns. By the second mode, it is written as Moulpmtkus. By the third mode, it is written thus: Smnrasuqno. By the inverted method, naturally, through the three posterior latter modes: by the first, it is thus: Cmndpctfns; by the second, thus: Kealpktmas; by the third mode, thus: Qmnruqasne. And thus we proceed in whole sentences. From these six modes mentioned above, the following rules are established, according to which you will guide yourself in the reading of our book, and each of the subsequent modes is varied by any of the aforementioned rules. You will observe their variation in many parts of our book, which in