Depending on the mode, the text is immediately analyzed during input and decrypted or encrypted accordingly.
As additional options:
- the key can be adapted. For example, it is possible to disguise Kenny’s code as Abaddon or Morse.
- the consideration of lower and upper case can be enforced.