Vigene'Re Cipher: Solution
Vigene'Re Cipher: Solution
Solution
Step 1
Plain text = Eisha Mehmood
Step 2
Key = 20088 (using auto key which only one time and then the plain text is used to
compete the plain text length)
Step 3
Using encryption formula = (P+K) MOD 26
Using de cryption formula = (C-K) MOD 26
ENCRYPTION
E I S H A M E H M O O D
4 8 18 7 0 12 4 7 12 14 14 3
2 0 0 8 8 E I S H A M E
2 0 0 8 8 4 8 18 7 0 12 4
6 8 18 15 8 16 12 25 19 14 0 7
G I S P I O M Z T O A H
DECRYPTION
G I S P I O M Z T O A H
6 8 18 15 8 16 12 25 19 14 0 7
2 0 0 8 8 E I S H A M E
2 0 0 8 8 4 8 18 7 0 12 4
4 8 18 7 0 12 4 7 12 14 14 3
E I S H A M E H M O O D
REMINDER in encryption if the value after addition is bigger than 26 then subtraction is
performed eg 27-26=1 MOD 26
In decryption if the value after subtraction is negative than then 26 is added
eg 0-14 = -14+26 = 12 MOD 26
I N F O R M A T I O N S
Q N R D V D F H Z A V V
I A M P E R F O R M I D
E C U R I T Y I N F O R
T A W X Z E K M Q V X U
P Y C G R L M E D Q J D
M A T I O N S E C U R
J F K Q C A V W D E R
X F R I O N D S B I A
ENCRYPTION
Step 1: Select plain text to encrypt
Plaintext: MALAIKARIF
Step 2: Select a key with which you want to encrypt
Key: BEHONESTWU
Step 3: Repeatedly write the key until it becomes equal to the plaintext as given below
But we don’t require step 3 because key is equal to plaintext
M A L A I K A R I F
B E H O N E S T W U
Step 4:
Use table to find encrypted value the point where plaintext and key intersect in below table it
will be encrypted alphabet
M and B intersects at N
A and E intersects at E
L and H intersects at S
A and O intersects at O
I and N intersects at V
K and E intersects at O
A and S intersects at S
R and T intersects at K
I and W intersects at E
F and U intersects at Z
MALAIKARIF after encryption is NESOVOSKEZ
DECRYPTION
Step 1: Select cipher text to decrypt
Ciphertext: NESOVOSKEZ
Step 2: Select a key with which you want to encrypt
Key: BEHONESTWU
Step 3: Repeatedly write the key until it becomes equal to the ciphertext as given below
But we don’t require step 3 because key is equal to ciphertext
Ciphertext N E S O V O S K E Z
KEY B E H O N E S T W U
PLAINTEXT M A L A I K A R I F
Step 4:
Use table to find encrypted value the point where key and following ciphertext matches in
plaintext column in below table it will be decrypted alphabet
B and N meets at M
E and E meets at A
H and S meets at L
O and O meets at A
N and V meets at I
E and O meets at K
S and S meets at A
T and K meets at R
W and E meets at I
U and Z meets at F
NESOVOSKEZ after decryption is MALAIKARIF
Q4. (a)Is Vigenère cipher secure? justify your answer?
Vigenère is insecure because key repeats itself until it becomes equal to plaintext.
A million-character plaintext with a 10-character password is easy to break. But a 10-character
plaintext with a 10 character randomly chosen password is essentially a one-time-pad and
theoretically unbreakable.
(b)How do you make Vigenère cipher secure?
Vigenère cipher regard as simplest and weakest method, that
mean it is very easy to detect by intruder or attacker. To
overcome the limitations of this method, we propose a new
algorithms which include combining Vigenère substitution
cipher with Stream cipher Stream cipher relatively regards as unbreakable method, and it uses
binary form (instead of characters) where the Plaintext, Ciphertext and the Key are strings of
bits.