Fact-checked by Grok 2 weeks ago

Vigenère cipher

The Vigenère cipher is a polyalphabetic method of encrypting alphabetic text, in which each letter of the is shifted a different number of places down an alphabet based on a predetermined keyword, effectively using a series of interwoven Caesar ciphers to obscure letter frequencies. It was first publicly described in 1586 by French diplomat in his book Traicté des chiffres ou secrètes manières d'escrire, though earlier similar polyalphabetic techniques had been proposed by Italian cryptographer in 1553. The cipher operates using a Vigenère square (also known as a ), a 26-by-26 table of letters where each row represents a shifted version of the , starting from A in the first row to Z in the last. To encrypt a , the keyword is repeated to match the length, and for each position, the corresponding keyword letter determines the row of the square from which the plaintext letter (as a column) is shifted to produce the ciphertext. Decryption reverses this process by using the keyword to identify the row and locating the ciphertext letter within it to find the original column. This repeating key structure provides greater security than simple monoalphabetic ciphers like the Caesar shift, as it flattens the statistical distribution of letters in the ciphertext, making more challenging. Historically, the Vigenère cipher gained its reputation for strength in the , often dubbed le chiffre indéchiffrable (the indecipherable cipher), and remained in practical use for diplomatic and for nearly three centuries. It was independently broken in the mid-19th century—first unpublished by English mathematician in 1854, and then publicly by Prussian military officer Friedrich Kasiski in 1863 through methods that detect keyword length via repeated letter patterns (). Variants include the Beaufort cipher (a form using instead of addition) and the Gronsfeld cipher (a weaker version using numeric digits 0–9 for shifts), which influenced later mechanical encryption devices like rotor machines. Despite its vulnerabilities to modern , the Vigenère cipher remains a foundational example in education, illustrating principles of key-based polyalphabetic and the evolution from manual to computational security.

Background

History

The Vigenère cipher, a polyalphabetic method, was first described by the Italian cryptographer in his 1553 treatise La cifra del. Sig. Giovan Battista Bellaso, where he outlined a system using a keyword to generate multiple Caesar shifts for encrypting messages. Although the cipher bears the name of , a and , modern scholarship attributes its invention to Bellaso, with Vigenère's later description representing an independent or adapted formulation. Vigenère detailed a variant in his 1586 book Traicté des chiffres ou secrètes manières d'escrire, incorporating polyalphabetic elements and referencing earlier works by and Bellaso, though he did not claim originality. During the , the cipher gained traction for securing military and diplomatic communications across , valued for its resistance to simple compared to monoalphabetic ciphers like the Caesar shift. Its adoption extended into the , aiding confidential exchanges in an era of frequent warfare and intrigue, though specific instances of use remain sparsely documented due to the secrecy of cryptographic practices. By the 19th century, the cipher had been popularized in France as le chiffre indéchiffrable ("the indecipherable cipher"), reflecting confidence in its security against contemporary attacks. This reputation persisted until British mathematician and inventor successfully cryptanalyzed it around 1846, employing methods to identify keyword lengths and dismantle the polyalphabetic structure, marking a pivotal advancement in cryptologic history. Subsequent scholarship in the further clarified the misattribution to Vigenère, emphasizing Bellaso's foundational role through comparative analysis of historical texts.

Relation to Other Ciphers

The Vigenère cipher represents a significant evolution from the , which employs a single fixed shift across the entire alphabet to substitute letters, making it vulnerable to . In contrast, the Vigenère cipher applies a series of Caesar shifts determined by the letters of a repeating keyword, effectively creating a polyalphabetic that varies the encryption for each plaintext letter and disrupts simple statistical patterns. This advancement built directly on the work of , who in 1518 introduced the , a tableau of 26 shifted alphabets that formed the basis for progressive polyalphabetic encryption in his Polygraphia. While Trithemius's method used a rigid, sequential progression of shifts without a keyword, Vigenère adapted this tableau in 1586 to incorporate a repeating keyword for more flexible and practical keying, enhancing usability while maintaining the polyalphabetic principle. Unlike monoalphabetic ciphers, such as the Caesar or simple substitution ciphers, which map each plaintext letter to a consistent ciphertext equivalent using a single permutation of the alphabet, the Vigenère cipher employs multiple Caesar ciphers in sequence based on the keyword, resulting in a different substitution alphabet for positions corresponding to each key letter. This polyalphabetic structure flattens letter frequencies in the ciphertext, providing greater resistance to basic cryptanalytic attacks compared to monoalphabetic systems. The Vigenère cipher served as a foundational precursor to more sophisticated polyalphabetic systems, influencing the development of rotor-based machines like the , which extended the concept of multiple dynamic substitutions through mechanical wheels to achieve even greater complexity and variability in encryption. A common misconception attributes the original Vigenère cipher to an autokey mechanism, where the plaintext itself extends the key after an initial primer, but Vigenère's primary description in 1586 focused on the repeating keyword method, with autokey presented as a separate variant he adapted from earlier ideas like those of Girolamo Cardano; the repeating key version, actually originating with in 1553, became indelibly associated with Vigenère's name.

Operation

Description

The Vigenère cipher operates by employing a keyword to generate a series of Caesar shifts applied to the , creating a polyalphabetic that varies the shift for each based on the keyword's letters. The core mechanism involves repeating the keyword cyclically until it matches the length of the message, with each keyword determining the shift amount for the corresponding , where A corresponds to a shift of 0, B to 1, and so on up to Z for 25. This process assumes the text consists solely of uppercase English letters, with spaces and punctuation typically ignored or removed prior to encryption. Central to the cipher is the tabula recta, also known as the Vigenère square, which is a 26×26 grid of letters where the rows and columns are labeled A through Z. The first row contains the standard alphabet (), while each subsequent row is a leftward cyclic shift of the previous one by one position, such that the row labeled B starts with B C D ... A, the row C with C D E ... B, and so forth. This table serves as a lookup tool for performing the shifts without explicit calculation. For encryption, the repeated keyword is aligned above the . For each i, the from the keyword selects the row in the , the selects the column, and the at their intersection becomes the . Decryption reverses this: the keyword again selects the row, but the is located within that row to identify the column label, which yields the original . A worked example illustrates the process: consider the plaintext "ATTACKATDAWN" and keyword "LEMON". The keyword repeats to "LEMONLEMONLE", aligned as follows:
Plaintext:ATTACKATDAWN
Key:LEMONLEMONLE
Ciphertext:LXFOPVEFRNHR
Applying the , the first A (column A) with key L (row L) intersects at L; T (column T) with E (row E) at X; and so on, yielding the "LXFOPVEFRNHR". To decrypt "LXFOPVEFRNHR" with "LEMONLEMONLE", for the first L in row L, it appears in column A, recovering A; X in row E appears in column T, recovering T; etc., restoring "ATTACKATDAWN".

Algebraic Formulation

The Vigenère cipher operates on an alphabet of 26 letters, typically the , where each letter is mapped to an from 0 to 25, with A corresponding to 0, B to 1, and so on up to at 25. All arithmetic operations are performed modulo 26 to ensure the results cycle within this range. Let the plaintext message be represented as a sequence of integers P_1, P_2, \dots, P_n, where each P_i is the numeric value of the i-th letter, and let the keyword be a K of m, with each letter K_j (for j = 1 to m) also mapped to an from 0 to 25. The key stream is generated by repeating the keyword cyclically to match the length of the plaintext: for position i, the key value K_i = K_{(i \mod m)}, where the operation ensures periodicity with period m. This repetition aligns each key letter with the corresponding plaintext letter. Encryption is defined by the formula C_i = (P_i + K_i) \mod 26 for each i = 1 to n, where C_i is the numeric value of the i-th ciphertext letter. Decryption reverses this process using P_i = (C_i - K_i) \mod 26, recovering the original plaintext values. The cipher's structure generalizes to any keyword length m, with the periodicity of the key stream directly tied to m, making the encryption a sequence of m independent Caesar shifts applied cyclically to the blocks. The reversibility of the follows from the of : substituting the into the decryption yields P_i = ((P_i + K_i) - K_i) \mod [26](/page/26) = P_i \mod [26](/page/26), confirming that decryption inverts uniquely for any key.

Cryptanalysis

Kasiski Examination

The Kasiski examination, a key cryptanalytic technique for polyalphabetic substitution ciphers like the Vigenère, was first systematically described by Friedrich Kasiski in his 1863 book Die Geheimschriften und die Dechiffrirkunst, though Charles Babbage had developed a similar method around 1846 in unpublished work and applied it to break several ciphers by 1854. This approach exploits the periodic nature of the repeating keyword, enabling attackers to estimate the key length without prior knowledge of the plaintext. The underlying principle relies on the fact that in a Vigenère cipher, identical segments encrypted under the same letters will produce identical segments; thus, if the same repeats at positions separated by a multiple of the length, the corresponding will exhibit matching sequences. To apply the , the analyst scans the for repeated sequences of three or more letters, records the positional distances between each pair of occurrences, and computes the (GCD) of these distances; the GCD is likely to be the length or a thereof, as repetitions are less probable for longer strings. For example, consider the fragment "KIOV IEEIG KIOV NU...", where "KIOV" repeats with a of 9 positions between starts; the GCD of such distances (after checking multiple repeats and discarding spurious ones) might yield 3, indicating a length of 3, as in the case where the is "RUN" encrypting like "to be or not to be...". Once the key length is estimated, the can be divided into subsets for further analysis, such as frequency counts per position. Despite its effectiveness, the Kasiski examination has limitations, including vulnerability to false positives from coincidental repeats in the ciphertext, which can suggest incorrect key lengths, and reduced reliability with short texts or when the plaintext lacks natural repetitions (e.g., in randomized or non-repetitive messages). Its success improves with longer ciphertexts, where genuine repeats dominate over random ones.

Index of Coincidence Test

The (IC) is a statistical tool in that measures the degree of unevenness in letter frequencies within a text, helping to distinguish between monoalphabetic and polyalphabetic ciphers such as the Vigenère. Developed by in 1920 while at Riverbank Laboratories, it was first published in his 1922 monograph The Index of Coincidence and Its Applications in Cryptography. The IC provides a probabilistic indicator of redundancy in the text, with higher values suggesting language-like frequency distributions typical of monoalphabetic encryptions. The IC is calculated using the formula \text{IC} = \frac{\sum_{i=1}^{26} f_i (f_i - 1)}{N (N - 1)}, where f_i is the frequency of the i-th letter in the 26-letter alphabet, and N is the total number of letters in the text. This expression estimates the probability that two randomly selected letters from the text are identical, accounting for the combinatorial nature of coincidences. For plaintext in English, the expected IC is approximately 0.065 to 0.066, reflecting the natural unevenness of letter frequencies (e.g., 'E' at about 12.7%, 'Z' at 0.07%). In contrast, for a random or uniformly distributed text (as in a long-key polyalphabetic cipher), the expected IC is about 0.038, equivalent to $1/26. In the context of the Vigenère cipher, the overall IC of the ciphertext tends to be lower than that of English plaintext, approaching the random value of 0.038 as the key length l increases, due to the mixing of multiple substitution alphabets. An approximation for this overall IC is given by \text{IC} \approx \frac{0.065}{l} + \left(1 - \frac{1}{l}\right) \times 0.038, which shows how the monoalphabetic contribution diminishes with longer keys. Friedman's test applies the to estimate the Vigenère key length by testing possible values of k (typically from 1 to 20 or half the ciphertext length). For each assumed k, the ciphertext is partitioned into k separate sequences, each comprising every k-th letter (i.e., positions congruent k). The is then computed for each sequence. If k matches the true key length, each sequence encrypts a monoalphabetic of the , yielding IC values around 0.065 for each; thus, the average IC across the k sequences will peak near 0.065. For incorrect k, the sequences remain polyalphabetic with effective periods that are multiples or factors, resulting in IC values closer to 0.038 and a lower average. Peaks in the average IC plot identify the key length (and its multiples), enabling subsequent attacks like on the aligned cosets. Additionally, the variance of the individual sequence ICs can confirm the result: low variance (all near 0.065) supports the correct k, while high variance indicates misalignment. This method excels with shorter ciphertexts (as few as 100-200 letters) where repeated sequences are scarce, relying instead on statistical properties of language rather than deterministic patterns.

Frequency Analysis

Frequency analysis applied to the Vigenère cipher involves treating each position in the key cycle as a separate monoalphabetic substitution cipher, specifically a Caesar shift, after the key length k has been estimated from prior tests. The ciphertext is divided into k cosets, where each coset comprises every k-th letter of the ciphertext, starting from the first, second, and so on up to the k-th position. For instance, with a key length of 5, the first coset includes positions 1, 6, 11, etc., the second coset positions 2, 7, 12, etc. Each coset is then analyzed independently by computing the frequency distribution of its letters, which should approximate the shifted frequencies of the plaintext language's letter distribution due to the fixed shift imposed by the corresponding key letter. To deduce the key letter for a given , the observed peaks are mapped to the expected , typically using standard tables for the language (e.g., English, where 'E' occurs about 12.7% of the time, followed by 'T' at 9.1%). The most frequent letter in the is assumed to correspond to the most common letter, such as 'E'; the letter is then the one whose numerical position (A=0 to Z=25) equals the difference (ciphertext letter position minus letter position) 26. For example, if the first shows a high of 'K' (position 10), mapping it to 'E' (position 4) yields a shift of $10 - 4 = 6 26, corresponding to the letter 'G' (position 6). This process is repeated for each , often with iterative refinement to resolve ambiguities by testing adjacent shifts and evaluating the resulting partial for or linguistic patterns. Tools like English tables and computational aids for comparison facilitate this mapping. Challenges arise when the key length is long relative to the message length, resulting in few letters per and unreliable estimates, or when the is in a non-English without access to appropriate tables, which can lead to incorrect mappings. Mutual indexing, involving cross-verification of alignments between cosets or against known patterns, can confirm candidate shifts but requires sufficient text volume. Overall, this method effectively reveals candidate key letters for each position, enabling partial decryption; a complete break necessitates successful of all cosets to reconstruct the full key and recover the .

Key Elimination

Key elimination in the cryptanalysis of the Vigenère cipher involves generating candidate keys derived from preliminary of the and then systematically testing them against the full to identify the correct one based on the resulting plaintext's linguistic properties. This process typically begins by proposing multiple possible shifts for each position in the key, as each may yield several plausible mappings due to limited data or ambiguities in letter frequencies. Each candidate key is then applied to decrypt the entire message, and the outputs are scored for using measures such as digram and frequencies that align with expected patterns in the target language, or more advanced n-gram models that evaluate overall text coherence. Charles Babbage pioneered an iterative form of key elimination in the mid-19th century, assuming partial keys for initial cosets and propagating these assumptions to check for consistency across the remaining cosets by examining whether the decrypted fragments formed coherent segments. This method involved testing letter chains at various intervals and eliminating incompatible partial keys through cross-validation of emerging patterns, such as recognizable word divisions or repeated phrases. Babbage applied this refinement technique to break military Vigenère ciphers during the era, demonstrating its efficacy against practical encryptions of the time. In modern computational approaches, key elimination for short keys employs brute-force enumeration of candidate keys combined with automated scoring via entropy measures or chi-squared statistics on the decrypted text to quantify deviation from random noise and favor English-like distributions. For instance, starting from frequency-derived guesses, an algorithm might iteratively vary each key letter, selecting the variant that maximizes a fitness score based on n-gram probabilities, thereby narrowing to the optimal key through successive eliminations. A representative example illustrates this process: given a ciphertext suspected to use a five-letter key, frequency analysis might suggest candidates like "LEMON" or "KEYED." Decrypting the full text with "LEMON" yields intelligible English prose with common digrams like "TH" and "HE," while "KEYED" produces gibberish with low trigram scores; thus, "LEMON" is selected as it aligns with expected language statistics. Babbage's 1854 solution to Vigenère-encrypted military messages, refined through this elimination process, marked a pivotal historical break, enabling decryption of sensitive dispatches without prior knowledge of the full key. However, the method's effectiveness diminishes for long keys, as the exponential growth in candidate combinations resists manual or even early computational efforts without substantial length.

Variants

Autokey Cipher

The autokey cipher is a variant of the Vigenère cipher introduced by in 1586, in which the keystream is extended beyond an initial primer keyword by appending the plaintext, resulting in a non-repeating key as long as the message itself. This approach modifies the standard repeating-key mechanism of the Vigenère cipher by making the keystream dependent on the message content, thereby increasing its effective length and complicating statistical attacks. Vigenère described this system in his treatise Traicté des Chiffres, emphasizing its role in enhancing polyalphabetic security without requiring a pre-shared long key. In the autokey mechanism, encryption begins with a short primer keyword of length m, followed by the plaintext to generate the full keystream. The sender concatenates the primer with the plaintext to form the keystream, ensuring each keystream position after the primer draws directly from the corresponding letter. This self-synchronizing process ties the key generation to the message, distinguishing it from the fixed repeating keyword of the classical Vigenère. For decryption, the receiver starts with the shared primer to recover the initial plaintext segment from the ciphertext, then uses the successively recovered plaintext letters as the continuing keystream in a sequential manner. Encryption follows the additive structure of the Vigenère cipher, where letters are numerically encoded (A=0, B=1, ..., Z=25). The ciphertext letter C_i at position i is computed as C_i = (P_i + K_i) \mod 26, with the keystream K defined such that K_1 to K_m are the primer letters, and K_{m+i} = P_i for i = 1, 2, \dots. This formulation ensures the keystream evolves with the plaintext, producing a unique shift for each message position after the primer. Decryption reverses this process sequentially: for the first m positions, compute P_i = (C_i - K_i) \mod 26 using the primer for K; thereafter, use the recovered plaintext letters as the keystream, so P_i = (C_i - P_{i-m}) \mod 26. This step-by-step recovery allows full decryption with only the primer and ciphertext, as each new plaintext letter immediately becomes available for the next keystream position. The main advantage of the autokey cipher lies in its extended, message-dependent keystream, which eliminates the periodic repetition of the standard Vigenère key and thereby reduces vulnerability to and methods like that exploit key periodicity. By matching the keystream length to the message, it achieves a theoretical perfect for random under certain conditions, though practical weaknesses arise from predictable structures that can aid partial key recovery. Historically, while Vigenère proposed the autokey as a robust improvement, its security was scrutinized in the alongside the repeating-key Vigenère, with contributing to early cryptanalytic techniques that highlighted differences in their breakability around 1854. For example, consider the primer "" (m=3) and "ATTACK". The initial keystream segment is "KEY", extended by the plaintext's first three letters to "KEYATT" for the full message. Encoding yields:
  • Position 1: A (0) + K (10) = 10 mod 26 → K
  • Position 2: T (19) + E (4) = 23 mod 26 → X
  • Position 3: T (19) + Y (24) = 43 mod 26 = 17 → R
  • Position 4: A (0) + A (0) = 0 mod 26 → A
  • Position 5: C (2) + T (19) = 21 mod 26 → V
  • Position 6: K (10) + T (19) = 29 mod 26 = 3 → D
The resulting ciphertext is "KXRAVD". Decryption starts with the primer: K - K = 0 → A, X - E = 19 → T, R - Y = 19 → T; then A - A (from position 1) = 0 → A, V - T (position 2) = 2 → C, D - T (position 3) = 10 → K, recovering "".

Beaufort Cipher

The Beaufort cipher is a polyalphabetic that modifies the Vigenère cipher by reversing the order of the letters in the and employing subtraction instead of addition for enciphering. This reversal means the tableau's rows and columns are arranged such that the standard alphabetical progression is inverted, facilitating a distinct lookup process. The cipher was attributed to Sir , a hydrographer and , who developed it in the early for secure naval communications, leveraging its simplicity for manual use in maritime signaling. In the Beaufort cipher, encryption is performed using the formula C_i = (K_i - P_i) \mod 26, where C_i is the ciphertext letter, K_i is the corresponding key letter, and P_i is the plaintext letter, with letters mapped to numbers from (A) to (Z); to ensure a non-negative result, is added if the subtraction yields a negative value. Decryption employs the identical operation: P_i = (K_i - C_i) \mod 26, rendering the cipher —meaning the same procedure serves both encryption and decryption without additional steps. This symmetry distinguishes it from the Vigenère cipher, where encryption adds the key to the plaintext modulo , while decryption subtracts, and it enables faster manual operations by eliminating the need to switch methods mid-process. The repeating keyword is applied over the plaintext in the same manner as Vigenère, maintaining polyalphabetic substitution but with equivalent cryptographic security, as the core weaknesses, such as vulnerability to key length detection via methods like the Kasiski examination, remain unchanged. For example, using the key "LEMON" (repeated as needed) and "ATTACK", the numerical mappings are key values 11 (L), 4 (E), 12 (M), 14 (O), 13 (N), 11 (L) and values 0 (A), 19 (T), 19 (T), 0 (A), 2 (C), 10 (K). Applying the formula yields values (11-0)=11 (L), (4-19+26)=11 (L), (12-19+26)=19 (T), (14-0)=14 (O), (13-2)=11 (L), (11-10)=1 (B), producing the "LLTOLB"—distinct from the Vigenère output for the same inputs. This reciprocity ensures that applying the same to "LLTOLB" recovers "ATTACK" directly, highlighting the cipher's operational efficiency for field use.

Gronsfeld Cipher

The Gronsfeld cipher is a polyalphabetic that functions as a variant of the Vigenère cipher, employing a repeating numeric consisting of digits from 0 to 9 to determine the shift for each . Unlike the Vigenère, which uses alphabetic characters for shifts ranging from 0 to 25, the Gronsfeld restricts shifts to 0 through 9, making it a numeric analog with a correspondingly reduced key space. This limitation simplifies implementation but also diminishes security by limiting the variety of possible encryptions compared to the full 26- . The Gronsfeld cipher is named after Count Jost Maximilian von Gronsfeld (1598–1662), a Bavarian to whom its invention is attributed in the mid-17th century; it was described by the Jesuit scholar Gaspar Schott in his 1659 work Magia universalis naturæ et artis for cryptographic purposes. It gained some use during that period as a practical adaptation of polyalphabetic encryption principles, though it remained less complex than its alphabetic predecessor. In operation, the numeric key repeats cyclically across the plaintext, with each digit specifying the Caesar shift to apply to the corresponding letter, treating the alphabet as numbered from A=0 to Z=25. The encryption formula is given by: C_i = (P_i + D_i) \mod 26 where P_i is the numeric value of the i-th plaintext letter, D_i is the corresponding key digit (0-9), and C_i is the numeric value of the i-th ciphertext letter. Decryption reverses this by subtracting the key digits modulo 26. For example, using the key "432" to encrypt the plaintext "HELLO" (with the key repeating as 4,3,2,4,3): H (7) + 4 = 11 (L), E (4) + 3 = 7 (H), L (11) + 2 = 13 (N), L (11) + 4 = 15 (P), O (14) + 3 = 17 (R), yielding "LHNPR". A primary weakness of the Gronsfeld cipher stems from its constrained key space: for a key of length m, there are only $10^m possible keys, far fewer than the $26^m for a Vigenère key of equivalent length, enabling feasible brute-force attacks even for modest m. This numeric restriction also makes the cipher more susceptible to frequency-based cryptanalysis, as the limited shift variety produces less uniform letter distributions than broader polyalphabetic systems.

Running Key Variant

The running key variant of the Vigenère cipher modifies the standard polyalphabetic substitution by using a long, non-repeating keystream generated from an external text source, such as a specific passage from a book, document, or prayer, to provide successive key letters. This keystream is applied sequentially to the plaintext without repetition or cycling, ensuring the key length matches or exceeds the message length. The mechanism relies on the Vigenère tableau for encipherment: each plaintext letter is shifted by the numerical value (A=0 to Z=25) of the corresponding keystream letter, with the ciphertext letter determined modulo 26. Decipherment reverses this process by subtracting the keystream shift from the ciphertext. Historically, the emerged in the late 19th and early 20th centuries as a practical enhancement to earlier polyalphabetic systems, with documented use in military and espionage contexts. For instance, German intelligence services employed variants where offsets were determined by running keys during . William F. Friedman, a pioneering U.S. cryptographer, analyzed and described methods for solving such ciphers in his 1918 publication, noting their prior reputation for security in field operations, including with the U.S. Army Disk device. This variant served as a precursor to more advanced systems like the , bridging classical book-based encryption and modern stream ciphers. In terms of security, the running key variant offers significantly greater resistance to traditional attacks like compared to the repeating-key Vigenère, as the absence of periodicity disrupts key length detection. If the keystream is truly random and at least as long as the , it achieves akin to a , rendering it unbreakable without the key. However, practical implementations using sources, such as book excerpts, introduce vulnerabilities: long ciphertexts enable of digrams or trigrams, while known attacks can reveal key portions if the source text is guessable. Friedman's work demonstrated that even short messages could be solved via probable word methods, and series of messages under the same key were decipherable faster than encipherment. To illustrate, consider the plaintext "ATTACK" (shifted to numbers: A=0, T=19, etc.) and a running key excerpt "THEQUICK" (T=19, H=7, E=4, Q=16, U=20, I=8, C=2, K=10). The ciphertext is computed as follows:
PositionPlaintextP ValueKey LetterK ValueC Value (P + K mod 26)Ciphertext
1A0T1919T
2T19H70 (26 mod 26)A
3T19E423X
4A0Q1616Q
5C2U2022W
6K10I818S
Resulting in ciphertext "TAXQWS". Sender and receiver must agree on the exact source, edition, and starting page/paragraph for . Key drawbacks include the need for identical key sources, which poses logistical challenges in —mismatches in editions or starting points can prevent decryption—and the risk of compromise if the source (e.g., a common book) is suspected or searched. Predictable linguistic patterns in the keystream also allow advanced statistical attacks on extended messages, undermining the variant's without rigorous .

References

  1. [1]
    The Vigenère Cipher: Introduction
    The Vigenère cipher first appeared in the 1585 book Traicté des Chiffres (A Treatise on Secret Writing) by Blaise de Vigenère.Missing: facts | Show results with:facts
  2. [2]
    Vigenere Cipher - Computer Science
    Jun 10, 2014 · Vigenere-like substitution ciphers were regarded by many as practically unbreakable for 300 years. In 1863, a Prussian major named Kasiski ...
  3. [3]
    [PDF] Ciphers - Princeton University
    The Vigenère cipher uses a keyword to vary the substitution formula with each new letter. Each substitution is determined by a simple shift of the alphabet as ...
  4. [4]
    [PDF] Trithemius, Bellaso, Vigenère Origins of the Polyalphabetic Ciphers
    The best known polyalphabetic cipher re- mains the one of Blaise de Vigenère, published in 1586. Vigenère in his work mentions both. Trithemius and Bellaso, and ...
  5. [5]
    Blaise de Vigenère Describes What is Later ... - History of Information
    Vigenère's book described a text autokey cipher that became known as the Vigenère cipher ... cipher was Giovan Battista Bellaso (1563). “Vigenère became ...Missing: origins | Show results with:origins
  6. [6]
    How a 17th century cipher became the basis of an unbreakable 20th ...
    Sep 11, 2015 · One of the most interesting ciphers designed to eliminate the vulnerability to symbol frequency analysis was the Vigenere cipher.
  7. [7]
    History of Cryptography, behind the code - Episode 1
    May 18, 2023 · This cipher was used for military and diplomatic communications during the Renaissance period and remained unbreakable for over 300 years ...
  8. [8]
    Vigenère Cipher - Crypto Corner - Interactive Maths
    What is today known as the Vigenère Cipher was actually first described by Giovan Battista Bellaso in his 1553 book La cifra del. Sig. Giovan Battista Bellaso.Missing: origins | Show results with:origins
  9. [9]
    Babbage and cryptography. Or, the mystery of Admiral Beaufort's ...
    ... Vigenère cipher, the “chiffre indéchiffrable” of more than two and a half centuries. For before any known publication, and by a wide margin, he made three ...Missing: le | Show results with:le
  10. [10]
    [PDF] Cryptography of the Vigenère Cipher - Northern Kentucky University
    The Vigenère cipher is based upon a square that consists of the 26 Caesar cipher alphabets; this is in fact the square used by Trithemius [1462 – 1516]. ... The ...
  11. [11]
    None
    ### Summary of Vigenère Cipher and Related Topics
  12. [12]
    Vigenère and the Age of Polyalphabetic Ciphers - Probabilistic World
    Apr 20, 2020 · The 11th century Chinese military collection Wujing Zongyao recommended a small code for military communication that is very similar to the ...
  13. [13]
    [PDF] The Enigma Machine - Introduction to Cryptography CS 355
    Basic idea: if the key in Vigenere cipher is very long, then the attacks won't work. • Implementation idea: multiple rounds of substitution.<|separator|>
  14. [14]
    The Vigenère Cipher Encryption and Decryption
    For example, to decrypt the first letter T in the ciphertext, we find the corresponding letter H in the keyword. Then, the row of H is used to find the ...
  15. [15]
    Classical Ciphers
    ... lookup table called the Vigenère square or tabula recta. It is a 26×26 grid containing shifted alphabets. Each row is a Caesar cipher with a different shift:
  16. [16]
    Laboratory Project: Encryption/Decryption using Vigenere Tableaux
    Oct 21, 2003 · We begin by writing the keyword, repeated as many times as necessary, above the plaintext message. To derive the ciphertext using the tableau, ...
  17. [17]
    The Algebraic Nature of the Vigenère Cipher
    The ciphertext letter C is obtained as follows, where "mod" is the modulus arithmetic: C = (P + d) mod 26.
  18. [18]
    Vigenere Cipher - Maple Help - Maplesoft
    The Vigenère Cipher is a simple form of polyalphabetic substitution through which alphabetic text is encrypted using a series of Caesar ciphers with different ...
  19. [19]
    The Vigenere Cipher
    The Vigenere Cipher is a clever variation on the Caeser shift cipher that is both easy to implement and resistant to very simple frequency analysis attacks.
  20. [20]
    [PDF] Charles Babbage Friedrich W. Kasiski
    cipher with repeating keyword (Vigenére cipher) using. Kasiski examination. • Find (long) repeated ciphertext fragments. • Discard spurious repetitions. • gcd ...
  21. [21]
    [PDF] A Brief History of Cryptography - a. w. walker
    ... VIGENERE ... Kasiski published an attack now known as Kasiski examination.4. To apply this technique, we first find all repeated strings in the ciphertext.
  22. [22]
    [PDF] Historical Ciphers - People | Electrical and Computer Engineering
    Chapter 7.3 Classical ciphers and historical development. Why (not) to ... Kasiski's method. 1918. Index of coincidence. William Friedman. Shift ciphers.
  23. [23]
    [PDF] The Vigenère Cipher - Introduction to Cryptography CS 355
    Vigenere masks the frequency with which a character appears in a language: one letter in the ciphertext corresponds to multiple letters in the plaintext.Missing: process | Show results with:process
  24. [24]
    Pre-1952 Historical Timeline - National Security Agency
    1920 William Friedman published The Index of Coincidence at Riverbank Laboratories; 1920 Dec 06 William Friedman hired as contract code compiler by U.S. Army ...
  25. [25]
    None
    ### Summary of Friedman Test from https://websites.nku.edu/~christensen/1402%20Friedman%20test%202.pdf
  26. [26]
    None
    ### Summary of Index of Coincidence and Friedman’s Attack
  27. [27]
    None
    ### Summary of Frequency Analysis Method for Vigenère Cipher Cryptanalysis
  28. [28]
    Breaking The Vigenere Encryption System - UCSD Math
    To break Vigenere encryption, one guesses a period p and then, by comparing the histogram of observed frequencies of sth letters to the histogram of English ...
  29. [29]
    [PDF] The Effect Of Varying Key Length On A Vigenère Cipher
    This paper studies the effect of varying the key length on the performance of Vigenère cipher andits frequency analysis attack. ... limitations of cryptanalysis ...
  30. [30]
    None
    Below is a comprehensive merged summary of Charles Babbage and the Vigenère Cipher based on the provided segments from "The Codebreakers" by David Kahn. To retain all information in a dense and organized manner, I will use a combination of narrative text and a table in CSV format to capture detailed references, methods, and page numbers. The narrative will provide an overview, while the table will serve as a structured repository of all specific details extracted from the summaries.
  31. [31]
    [PDF] Five Ways to Crack a Vigenère Cipher
    The Vigenère cipher is a periodic polyalphabetic substitution cipher. The key is a string of characters. To explain how the cipher works, ...<|control11|><|separator|>
  32. [32]
    None
    ### Summary of Vigenère Cipher Cryptanalysis Methods
  33. [33]
    Autokey Cipher - Crypto Corner
    The Autokey Cipher is one such example. In general, the term autokey refers to any cipher where the key is based on the original plaintext.
  34. [34]
    Vigenère and Gronsfeld Cipher - Practical Cryptography
    The best way to break the autokey cipher is to try and guess portions of the plaintext or key from the ciphertext, knowing they must both follow the frequency ...Missing: misconception | Show results with:misconception
  35. [35]
    Beaufort Cipher: Self-Reciprocal Naval Encryption Tool
    This innovative Beaufort cipher uses the same algorithm for both encryption and decryption, making it particularly valuable for practical cryptographic ...Mathematical Foundation And... · Frequently Asked Questions · How To Calculate Beaufort?
  36. [36]
    Beaufort cipher - Crypto Museum
    Feb 17, 2021 · The Beaufort Cipher is a polyalphabetic substitution cipher, created by British rear admiral Sir Francis Beaufort (1771-1857) [2]. It is based ...Missing: naval signals
  37. [37]
    Beaufort Cipher - Practical Cryptography
    The Beaufort cipher, created by Sir Francis Beaufort, is a polyalphabetic substitution cipher that is similar to the Vigenère cipher.
  38. [38]
    The Beaufort Cipher - CodedInsights
    The decryption process for the Beaufort cipher is the same as the encryption process, offering a practical advantage over other ciphers. It involves ...Beaufort Cipher and... · Reciprocal Nature of Beaufort... · Algebraic Description of...
  39. [39]
    Cryptography -- Gronsfeld Cipher
    The Gronsfeld cipher is a variation of the Vigenere cipher in which a key number is used instead of a keyword, e.g., 14965. Usually the key does not contain ...Missing: history mechanism
  40. [40]
    Gronsfeld Cipher (online tool) - Boxentriq
    Tool to decrypt Gronsfeld ciphers. The Gronsfeld cipher, also called Bronckhorst cipher, was invented by José de Bronckhorst (earl of Gronsfeld) in 1744.Missing: history mechanism
  41. [41]
    Gronsfeld Cipher | CΛTΞИCOΔΞ
    Example: Let's say we want to encrypt the plaintext "HELLO" using the numeric key "12345". Numeric Key: 1: Shift by 1; 2: Shift by 2; 3: Shift by 3; 4: Shift ...
  42. [42]
    [PDF] Methods for The Solution of Running-Key Ciphers Publication No. 16
    RUNNING-KEY CIPHER is the name applied to that system of enciphering which necessitates the use of a book or document, identical copies of which are in ...
  43. [43]
    [PDF] Contents 1 Classical Cryptosystems and Modular Arithmetic
    • The running-key cipher is harder to attack than the Vigenère cipher because of the non-repetitive nature of its key. However, with a sufficiently long ...
  44. [44]
    [PDF] The Cryptology of the German Intelligence Services (U)
    determined by a running key. The maximum offset, therefore, was nine ... General arrangements for carrying on espionage;. 9. Slipping agents through ...
  45. [45]
    Stream Cipher - an overview | ScienceDirect Topics
    Historically this method was actually used by various espionage agents, and there are references to it in some novels about spies. ... running key cipher. There ...
  46. [46]
    [PDF] Lecture Notes on Introduction to Cryptography
    2Note that if the key length of the Vigenère cipher is equal to the text length, and the key is used only once, the cipher is indeed unbreakable. Page 11 ...