0% found this document useful (0 votes)
71 views9 pages

Vigene'Re Cipher: Solution

The document summarizes the Vigenère cipher encryption and decryption process in 3 steps: 1) For encryption, the plaintext is encrypted using a repeating keyword cipher where each character is shifted according to the corresponding character in the keyword. This results in the ciphertext. 2) For decryption, the ciphertext is decrypted using the same repeating keyword cipher, where each character is shifted back according to the keyword to obtain the original plaintext. 3) The Vigenère cipher is insecure because the repeating keyword is easy to break through frequency analysis. It can be strengthened by combining it with a stream cipher that uses random bits rather than a repeating keyword. The Vigenère cipher differs from the Caesar cipher in that it

Uploaded by

Fajar Iqbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views9 pages

Vigene'Re Cipher: Solution

The document summarizes the Vigenère cipher encryption and decryption process in 3 steps: 1) For encryption, the plaintext is encrypted using a repeating keyword cipher where each character is shifted according to the corresponding character in the keyword. This results in the ciphertext. 2) For decryption, the ciphertext is decrypted using the same repeating keyword cipher, where each character is shifted back according to the keyword to obtain the original plaintext. 3) The Vigenère cipher is insecure because the repeating keyword is easy to break through frequency analysis. It can be strengthened by combining it with a stream cipher that uses random bits rather than a repeating keyword. The Vigenère cipher differs from the Caesar cipher in that it

Uploaded by

Fajar Iqbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

VIGENE’RE CIPHER

Solution
Step 1
Plain text = Eisha Mehmood

Step 2
Key = 20088 (using auto key which only one time and then the plain text is used to
compete the plain text length)

Step 3
Using encryption formula = (P+K) MOD 26
Using de cryption formula = (C-K) MOD 26
ENCRYPTION
E I S H A M E H M O O D
4 8 18 7 0 12 4 7 12 14 14 3
2 0 0 8 8 E I S H A M E
2 0 0 8 8 4 8 18 7 0 12 4
6 8 18 15 8 16 12 25 19 14 0 7
G I S P I O M Z T O A H
DECRYPTION
G I S P I O M Z T O A H
6 8 18 15 8 16 12 25 19 14 0 7
2 0 0 8 8 E I S H A M E
2 0 0 8 8 4 8 18 7 0 12 4
4 8 18 7 0 12 4 7 12 14 14 3
E I S H A M E H M O O D

REMINDER in encryption if the value after addition is bigger than 26 then subtraction is
performed eg 27-26=1 MOD 26
In decryption if the value after subtraction is negative than then 26 is added
eg 0-14 = -14+26 = 12 MOD 26
I N F O R M A T I O N S
Q N R D V D F H Z A V V
I A M P E R F O R M I D

E C U R I T Y I N F O R
T A W X Z E K M Q V X U
P Y C G R L M E D Q J D

M A T I O N S E C U R
J F K Q C A V W D E R
X F R I O N D S B I A

ENCRYPTION
Step 1: Select plain text to encrypt
Plaintext: MALAIKARIF
Step 2: Select a key with which you want to encrypt
Key: BEHONESTWU
Step 3: Repeatedly write the key until it becomes equal to the plaintext as given below
But we don’t require step 3 because key is equal to plaintext
M A L A I K A R I F
B E H O N E S T W U

Step 4:
Use table to find encrypted value the point where plaintext and key intersect in below table it
will be encrypted alphabet
M and B intersects at N
A and E intersects at E
L and H intersects at S
A and O intersects at O
I and N intersects at V
K and E intersects at O
A and S intersects at S
R and T intersects at K
I and W intersects at E
F and U intersects at Z
MALAIKARIF after encryption is NESOVOSKEZ

DECRYPTION
Step 1: Select cipher text to decrypt
Ciphertext: NESOVOSKEZ
Step 2: Select a key with which you want to encrypt
Key: BEHONESTWU
Step 3: Repeatedly write the key until it becomes equal to the ciphertext as given below
But we don’t require step 3 because key is equal to ciphertext

Ciphertext N E S O V O S K E Z
KEY B E H O N E S T W U
PLAINTEXT M A L A I K A R I F

Step 4:
Use table to find encrypted value the point where key and following ciphertext matches in
plaintext column in below table it will be decrypted alphabet
B and N meets at M
E and E meets at A
H and S meets at L
O and O meets at A
N and V meets at I
E and O meets at K
S and S meets at A
T and K meets at R
W and E meets at I
U and Z meets at F
NESOVOSKEZ after decryption is MALAIKARIF
Q4. (a)Is Vigenère cipher secure? justify your answer?
Vigenère is insecure because key repeats itself until it becomes equal to plaintext.
A million-character plaintext with a 10-character password is easy to break. But a 10-character
plaintext with a 10 character randomly chosen password is essentially a one-time-pad and
theoretically unbreakable.
(b)How do you make Vigenère cipher secure?
Vigenère cipher regard as simplest and weakest method, that
mean it is very easy to detect by intruder or attacker. To
overcome the limitations of this method, we propose a new
algorithms which include combining Vigenère substitution
cipher with Stream cipher Stream cipher relatively regards as unbreakable method, and it uses
binary form (instead of characters) where the Plaintext, Ciphertext and the Key are strings of
bits.

(c)How Vigenère cipher differ to Caesar cipher?


The Vigenère cipher is a polyalphabetic cipher consists of several Caesar ciphers in sequence
with different shift values while Caesar cipher is monoalphabetic ciphers in which each letter is
shifted along some places. For example, for a shift of 5 A will become F, B will map to G and so
on.

You might also like