0% found this document useful (0 votes)
73 views15 pages

Vigenere Cipher: By: Mohsin Tahir Waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan

The document discusses the Vigenere cipher, a method of encrypting text using a series of Caesar ciphers with a repeating keyword. It was originally believed to be unbreakable but was cracked in the 19th century using statistical analysis of repeating word patterns. The cipher uses a Vigenere tableau to encrypt letters by finding the intersection of the plaintext letter and keyword letter. It can be seen as a combination of additive ciphers. Kasiski's technique analyzed distances between repeated bigrams in the ciphertext to determine the keyword length.

Uploaded by

bahiru belina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views15 pages

Vigenere Cipher: By: Mohsin Tahir Waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan

The document discusses the Vigenere cipher, a method of encrypting text using a series of Caesar ciphers with a repeating keyword. It was originally believed to be unbreakable but was cracked in the 19th century using statistical analysis of repeating word patterns. The cipher uses a Vigenere tableau to encrypt letters by finding the intersection of the plaintext letter and keyword letter. It can be seen as a combination of additive ciphers. Kasiski's technique analyzed distances between repeated bigrams in the ciphertext to determine the keyword length.

Uploaded by

bahiru belina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Vigenere Cipher

By:
Mohsin Tahir
waqas Akram
Numan-Ul-Haq
Ali Asghar
Rao Arslan
Polyalphabetic Ciphers

The relationship between a character in


the plaintext to a character in the cipher
text is one-to-many.
Vigenere Cipher
 The Vigenere cipher is the kind of polyalphabetic cipher.
 It was design by Blaise de Vigenere, a 16th century French mathematician.
 It was used in the American civil war and was once believed to be
unbreakable.
 A Vigenere cipher uses a different strategy to create the key stream. The key
stream is a repetition of an initial secret key stream of length m, where we
have 1<=m<=26.
 The Vigenere cipher is a method of encrypting alphabetic text by using a
series of different Caesar ciphers based on the letters of a keyword.
 The Vigenere cipher uses multiple mixed alphabets, each is a shift cipher.
Vigenere Cipher

Plain text: Cipher text:

Key stream:

Encryption: Decryption:
Example
 We can encrypt the message “She is listening” using the 6-
character keyword “PASCAL“. The initial key stream is
(15,0,18,2,0,11). The key stream is the repetition of this initial key
stream (as many times as needed) .
Use encryption algo:
Note:-
 The Vigenere key stream dose not depend on the
plaintext characters. It depends only on the
position of the character in the plain text.
Example cont.…

 Vigenere cipher can be seen as combinations of m additive ciphers.


Vigenere Table

 Another way to look at Vigenere ciphers is through what is called a


Vigenere Tableau, Vigenere Table or Vigenere Square.
 The first row of this table has the 26 English letters. Shows the plain
text character to be encrypted.
 Starting with the second row, each row has the letters shifted to the
left one position in a cyclic way. For example, when B is shifted to
the first position on the second row, the letter A moves to the end.
 The first column contains the characters to be used by the key.
Example:-

 To find the cipher text for the plaintext “she is listening ”


using the word “PASCAL” as the key
• .we can find “s” in the first row, “p” in the first column, the
cross section is the cross section is the cipher text character “H”
• we can find “h” in the first row, “A” in the first column, the
cross section is the cross section is the cipher text character “H”
• And so on…..
Encrypt example:

“TO BE OR NOT TO BE THAT IS THE QUESTION”


Use Vigenere table method to encrypt plain text to cipher text.

Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION


Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL
Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY
Decrypt example:

“TO BE OR NOT TO BE THAT IS THE QUESTION”


Use Vigenere table method to decrypt cipher text to plain text.

Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL


Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY
Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION
Vigenere Cipher (Crypanalysis)

 This method was actually discovered earlier, in 1854 by Charles


Babbage.
 Vigenere-like substitution ciphers were regarded by many as
practically unbreakable for 300 years.
 In 1863, a Prussian major named Kasiski proposed a method for
breaking a Vigenere cipher that consisted of finding the length of
the keyword and then dividing the message into that many simple
substitution cryptograms.
Kasiski's technique
 Kasiski's technique for finding the length of the keyword was based on measuring the
distance between repeated bigrams in the ciphertext.
Example:-
Location: 01234 56789 01234 56789 01234 56789
Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL
Plaintext: tobeo rnott obeth atist heque stion
Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY
 Kasiski method would create something like the following list
Repeated First index Second index difference distance
Bigram
KS 0 9 9 9
SM 1 10 9 9
ME 2 11 9 9
….. ……. ……. …… …….

You might also like