{"id":101,"date":"2023-06-11T19:39:13","date_gmt":"2023-06-11T19:39:13","guid":{"rendered":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?page_id=101"},"modified":"2023-06-17T08:39:08","modified_gmt":"2023-06-17T08:39:08","slug":"vigenere-cipher","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/","title":{"rendered":"Vigenere Cipher"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Vigenere<\/h2>\n<div class=\"tabcontent\">\n\n<h3 class=\"LC20lb DKV0Md\">Vigen\u00e8re Cipher<\/h3>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Vigen%C3%A8re_cipher#\/media\/File:Vigenere.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-306 alignright\" src=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-content\/uploads\/sites\/27\/2023\/06\/Vigenere.jpg\" alt=\"Woodcut of Vigenere. Source Wikipedia\" width=\"297\" height=\"384\" srcset=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-content\/uploads\/sites\/27\/2023\/06\/Vigenere.jpg 428w, https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-content\/uploads\/sites\/27\/2023\/06\/Vigenere-232x300.jpg 232w\" sizes=\"(max-width: 297px) 100vw, 297px\" \/><\/a><\/p>\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"react-scroll-to-bottom--css-vgwjq-79elbk h-full dark:bg-gray-800\">\n<div class=\"react-scroll-to-bottom--css-vgwjq-1n7m0yu\">\n<div class=\"flex flex-col text-sm dark:bg-gray-800\">\n<div class=\"group w-full text-gray-800 dark:text-gray-100 border-b border-black\/10 dark:border-gray-900\/50 bg-gray-50 dark:bg-[#444654]\">\n<div class=\"flex p-4 gap-4 text-base md:gap-6 md:max-w-2xl lg:max-w-[38rem] xl:max-w-3xl md:py-6 lg:px-0 m-auto\">\n<div class=\"relative flex w-[calc(100%-50px)] flex-col gap-1 md:gap-3 lg:w-[calc(100%-115px)]\">\n<div class=\"flex flex-grow flex-col gap-3\">\n<div class=\"min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>The Vigen\u00e8re cipher is a polyalphabetic substitution cipher that was developed in the 16th century by a French cryptographer named Blaise de Vigen\u00e8re. It is named after him due to his contribution to the development and popularization of the cipher.<\/p>\n<p>Blaise de Vigen\u00e8re enhanced the earlier Alberti cipher, invented by Leon Battista Alberti in the 15th century. The Alberti cipher used a single mixed alphabet and a &#8220;Cipher Disk&#8221; device for encryption and decryption. Vigen\u00e8re&#8217;s improvement introduced the use of a repeating keyword or phrase to determine shifts, making it a more secure polyalphabetic cipher compared to monoalphabetic ciphers like the Caesar cipher.<\/p>\n<p>The Vigen\u00e8re cipher was widely acclaimed and considered unbreakable for many years, earning the name &#8220;le chiffre ind\u00e9chiffrable&#8221; or &#8220;the indecipherable cipher&#8221; in French. However, in the mid-19th century, mathematician Charles Babbage discovered a method to crack it using <strong>frequency analysis<\/strong>.<\/p>\n<p>Despite its vulnerability, the Vigen\u00e8re cipher had a significant impact on cryptography. It paved the way for the development of more advanced ciphers and encryption techniques. Today, it is commonly used as an educational tool to introduce polyalphabetic substitution ciphers and emphasize the importance of key management in cryptography.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"absolute bottom-0 left-0 w-full border-t md:border-t-0 dark:border-white\/20 md:border-transparent md:dark:border-transparent md:bg-vert-light-gradient bg-white dark:bg-gray-800 md:!bg-transparent dark:md:bg-vert-dark-gradient pt-2 md:-left-2\">\n<form class=\"stretch mx-2 flex flex-row gap-3 last:mb-2 md:mx-4 md:last:mb-6 lg:mx-auto lg:max-w-2xl xl:max-w-3xl\">\n<div class=\"relative flex h-full flex-1 items-stretch md:flex-col\" role=\"presentation\">\n<div class=\"\">\n<div class=\"h-full flex ml-1 md:w-full md:m-auto md:mb-2 gap-0 md:gap-2 justify-center\">It has f<a href=\"https:\/\/blog.mozilla.org\/en\/products\/firefox\/six-times-encryption-made-it-to-the-movies\/\">eatured numerous times on a number of different movies<\/a>!<\/div>\n<\/div>\n<\/div>\n<\/form>\n<\/div>\n\n<\/div><h2 class=\"tabtitle\">Encryption Process<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Encrypting a Message<\/h3>\n<p><a href=\"http:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-square.png\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-34 size-medium alignright\" src=\"https:\/\/learnlearn.uk\/algorithms\/wp-content\/uploads\/sites\/12\/2017\/01\/vigenere-square-300x300.png?_t=1620696571\" alt=\"vigenere-square\" width=\"300\" height=\"300\" \/><\/a><\/p>\n<ol>\n<li>Choose a secret keyword or phrase (e.g., &#8220;SECRET&#8221;).<\/li>\n<li>Write down the message you want to encrypt (e.g., &#8220;HELLO WORLD&#8221;).<\/li>\n<li>Convert the keyword and message to uppercase and remove any spaces or special characters.<\/li>\n<li>Using the Vigenere table(one the right) Find the row corresponding to the first letter of the keyword and the column corresponding to the first letter of the message. The intersection of the row and column represents the encrypted letter.\n<ul>\n<li>The message first letter H with the first keyword letter S encrypts to B.<\/li>\n<\/ul>\n<\/li>\n<li>Repeat step 5 for each letter in the message using the next letter in the keyword.\n<ul>\n<li>\n<pre>Keyword: S E C R E T S E C R E T<\/pre>\n<\/li>\n<li>\n<pre>Message: H E L L O W O R L D<\/pre>\n<\/li>\n<li>\n<pre>Encrypted: Z I N C S P G V J U<\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li>The encrypted message is &#8220;Z I N C S P G V J U&#8221;.<\/li>\n<\/ol>\n\n<\/div><h2 class=\"tabtitle\">Decryption Process<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Decrypting a Message<\/h3>\n<p>Decrypting is exactly the same method as encrypting, except in reverse.<\/p>\n<ol>\n<li>Start with the encrypted message (e.g., &#8220;Z I N C S P G V J U&#8221;).<\/li>\n<li>Write down the keyword used for encryption.<\/li>\n<li>Find the row corresponding to the first letter of the keyword and the column corresponding to the first letter of the encrypted message. The intersection of the row and column represents the decrypted letter.\n<ul>\n<li>The first encrypted letter B, with the first keyword letter S decrypts to H<\/li>\n<\/ul>\n<\/li>\n<li>Repeat for each letter:\n<ul>\n<li>\n<pre><span class=\"hljs-variable\">Keyword<\/span><span class=\"hljs-operator\">:<\/span>   MORSE<\/pre>\n<\/li>\n<li>\n<pre><span class=\"hljs-variable\">Encrypted<\/span><span class=\"hljs-operator\">:<\/span> IVR LLM GXG HIF RMK TH<\/pre>\n<\/li>\n<li>\n<pre><span class=\"hljs-variable\">Decrypted<\/span><span class=\"hljs-operator\">:<\/span> WHAT HAS GOD WRAUGHT<\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li>The decrypted message is &#8220;Hello World&#8221;<\/li>\n<\/ol>\n\n<\/div><h2 class=\"tabtitle\">Pros and Cons<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Advantages of Vigen\u00e8re Cipher<\/h3>\n<ol>\n<li>Polyalphabetic Encryption: The Vigen\u00e8re cipher uses multiple cipher alphabets, making it more secure than simple substitution ciphers. Each letter in the plaintext can have multiple corresponding ciphertext letters, adding complexity to the encryption.<\/li>\n<li>Key Management: The Vigen\u00e8re cipher relies on a keyword or phrase as the encryption key. This key can be easily changed for different messages, providing flexibility in encryption. The key length and complexity can enhance the security of the cipher.<\/li>\n<li>Resistance to Frequency Analysis: Unlike monoalphabetic ciphers, such as the Caesar cipher, the Vigen\u00e8re cipher does not preserve the frequency distribution of letters in the plaintext. This makes it more resistant to frequency analysis, a common method of breaking simple substitution ciphers.<\/li>\n<\/ol>\n<h3>Disadvantages of Vigen\u00e8re Cipher<\/h3>\n<ol>\n<li>Vulnerable to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kasiski_examination\">Kasiski Examination<\/a>: The Vigen\u00e8re cipher is susceptible to the Kasiski examination, which is a technique used to analyze repeated patterns in the ciphertext. Repeated sequences can reveal information about the keyword length and eventually lead to decryption.<\/li>\n<li>Key Length Consideration: The security of the Vigen\u00e8re cipher depends on the length and randomness of the keyword. If the keyword is short or easily guessable, the cipher becomes weaker. Long and random keywords are harder to remember and manage.<\/li>\n<li>Known-plaintext Attacks: If an attacker knows or can guess parts of the plaintext and the corresponding ciphertext, they can deduce information about the keyword. This knowledge can aid in breaking the cipher.<\/li>\n<li>Lack of Authentication and Integrity: The Vigen\u00e8re cipher only provides confidentiality for the message, but it does not provide authentication or integrity. It is susceptible to tampering and impersonation attacks.<\/li>\n<\/ol>\n\n<\/div><h2 class=\"tabtitle\">Resources<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Resources<\/h3>\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1nwkAgC3gCloO_vIPjzGv_EZ_0wQmP8Zt8aPnARK7ngA\/edit?usp=sharing\">Vigenere Cypher Worksheet<\/a><\/p>\n<p><a href=\"https:\/\/docs.google.com\/presentation\/d\/1DVwIElCnrN56W0FDZqZctqe5FRcYAYKJfyP-s_DZ0Yo\/edit?usp=sharing\">Vigenere Cypher Walkthrough Google Slides<\/a><\/p>\n<p><a href=\"https:\/\/www.aicurriculum.co.uk\/resources\/e50962e3-d037-4e88-94e8-50fdd4347605\">Vigenere Cypher Revision Resources<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Vigen\u00e8re Cipher The Vigen\u00e8re cipher is a polyalphabetic substitution cipher that was developed in the 16th century by a French cryptographer named Blaise de Vigen\u00e8re. It is named after him due to his contribution to the development and popularization of the cipher. Blaise de Vigen\u00e8re enhanced the earlier Alberti cipher, invented by Leon Battista Alberti&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Vigenere Cipher<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vigenere Cipher - Edexcel iGCSE Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vigenere Cipher - Edexcel iGCSE Computer Science\" \/>\n<meta property=\"og:description\" content=\"Vigen\u00e8re Cipher The Vigen\u00e8re cipher is a polyalphabetic substitution cipher that was developed in the 16th century by a French cryptographer named Blaise de Vigen\u00e8re. It is named after him due to his contribution to the development and popularization of the cipher. Blaise de Vigen\u00e8re enhanced the earlier Alberti cipher, invented by Leon Battista Alberti&hellip;&nbsp;Read More &raquo;Vigenere Cipher\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/\" \/>\n<meta property=\"og:site_name\" content=\"Edexcel iGCSE Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-17T08:39:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-content\/uploads\/sites\/27\/2023\/06\/Vigenere.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/\",\"url\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/\",\"name\":\"Vigenere Cipher - Edexcel iGCSE Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website\"},\"datePublished\":\"2023-06-11T19:39:13+00:00\",\"dateModified\":\"2023-06-17T08:39:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vigenere Cipher\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website\",\"url\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/\",\"name\":\"Edexcel iGCSE Computer Science\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vigenere Cipher - Edexcel iGCSE Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/","og_locale":"en_GB","og_type":"article","og_title":"Vigenere Cipher - Edexcel iGCSE Computer Science","og_description":"Vigen\u00e8re Cipher The Vigen\u00e8re cipher is a polyalphabetic substitution cipher that was developed in the 16th century by a French cryptographer named Blaise de Vigen\u00e8re. It is named after him due to his contribution to the development and popularization of the cipher. Blaise de Vigen\u00e8re enhanced the earlier Alberti cipher, invented by Leon Battista Alberti&hellip;&nbsp;Read More &raquo;Vigenere Cipher","og_url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/","og_site_name":"Edexcel iGCSE Computer Science","article_modified_time":"2023-06-17T08:39:08+00:00","og_image":[{"url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-content\/uploads\/sites\/27\/2023\/06\/Vigenere.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/","url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/","name":"Vigenere Cipher - Edexcel iGCSE Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website"},"datePublished":"2023-06-11T19:39:13+00:00","dateModified":"2023-06-17T08:39:08+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/vigenere-cipher\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/"},{"@type":"ListItem","position":2,"name":"Vigenere Cipher"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website","url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/","name":"Edexcel iGCSE Computer Science","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Vigen\u00e8re Cipher The Vigen\u00e8re cipher is a polyalphabetic substitution cipher that was developed in the 16th century by a French cryptographer named Blaise de Vigen\u00e8re. It is named after him due to his contribution to the development and popularization of the cipher. Blaise de Vigen\u00e8re enhanced the earlier Alberti cipher, invented by Leon Battista Alberti&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/101"}],"collection":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/comments?post=101"}],"version-history":[{"count":11,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/101\/revisions"}],"predecessor-version":[{"id":337,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/101\/revisions\/337"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/media?parent=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}