- Vigenère cipher
The Vigenère (pronEng|ˌviːdʒɪˈnɛəɹ, "veedj-ih-nair") cipher has been reinvented many times. The method was originally described by
Giovan Battista Bellasoin his 1553 book "La cifra del. Sig. Giovan Battista Bellaso"; however, the scheme was later misattributed to Blaise de Vigenèrein the 19th century, and is now widely known as the "Vigenère cipher".
This cipher is well known because while it is easy to understand and implement, it often appears to beginners to be unbreakable; this earned it the description le chiffre indéchiffrable (French for 'the unbreakable cipher'). Consequently, many people have tried to implement encryption schemes that are essentially Vigenère ciphers, only to have them broken [cite book|first=Laurence D.|last=Smith|year=1943|title=Cryptography the Science of Secret Writing: The Science of Secret Writing|chapter=Substitution Ciphers|editor=|others=|pages=81|publisher=Dover Publications|id=ISBN 048620247X] .
The first well documented description of a polyalphabetic cipher was formulated by
Leon Battista Albertiaround 1467 and used a metal cipher disc to switch between cipher alphabets. Alberti's system only switched alphabets after several words, and switches were indicated by writing the letter of the corresponding alphabet in the ciphertext. Later, in 1508, Johannes Trithemius, in his work "Poligraphia", invented the tabula recta, a critical component of the Vigenère cipher. Trithemius, however, only provided a progressive, rigid and predictable system for switching between cipher alphabets.
What is now known as the Vigenère cipher was originally described by
Giovan Battista Bellasoin his 1553 book "La cifra del. Sig. Giovan Battista Bellaso". He built upon the tabula recta of Trithemius, but added a repeating "countersign" (a key) to switch cipher alphabets every letter. Blaise de Vigenèrepublished his description of a similar but stronger autokeycipher before the court of Henry III of France, in 1586. Later, in the 19th century, the invention of Bellaso's cipher was misattributed to Vigenère. David Kahn in his book "The Codebreakers" lamented the misattribution by saying that history had "ignored this important contribution and instead named a regressive and elementary cipher for him [Vigenère] though he had nothing to do with it".cite book|first=Kahn|last=David|year=1999|title=The Codebreakers: The Story of Secret Writing|chapter=On the Origin of a Species|publisher=Simon & Schuster|id=ISBN 0684831309] The Vigenère cipher gained a reputation for being exceptionally strong. Noted author and mathematician Charles Lutwidge Dodgson ( Lewis Carroll) called the Vigenère cipher unbreakable in his 1868 piece " The Alphabet Cipher" in a children's magazine. In 1917, " Scientific American" described the Vigenère cipher as "impossible of translation". [cite book|first=Lars R.|last=Knudsen|year=1998|title=State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptograph Leuven Belgium, June 1997 Revised Lectures |chapter=Block Ciphers— a survey|editor=Bart Preneel and Vincent Rijmen|others=|pages=29|publisher=|id=ISBN 3540654747] This reputation was not deserved since Kasiski entirely broke the cipher in the 19th century and some skilled cryptanalysts could occasionally break the cipher in the 16th century.
The Vigenère cipher is simple enough to be a field cipher if it is used in conjunction with cipher disks. [ [http://www.vectorsite.net/ttcode_03.html#m2 Codes, Ciphers, & Codebreaking] (The Rise Of Field Ciphers)] The
Confederate States of America, for example, used a brass cipher disk to implement the Vigenère cipher during the American Civil War. The Confederacy's messages were far from secret and the Union regularly cracked their messages. Throughout the war, the Confederate leadership primarily relied upon three keywords, "Manchester Bluff", "Complete Victory" and, as the war came to a close, "Come Retribution". [cite book|first=Kahn|last=David|year=1999|title=The Codebreakers: The Story of Secret Writing|chapter=Crises of the Union|pages=217-221|publisher=Simon & Schuster|id=ISBN 0684831309] Gilbert Vernamtried to repair the broken cipher (creating the Vernam-Vigenère cipher in 1918), but, no matter what he did, the cipher was still vulnerable to cryptanalysis. Vernam's work, however, eventually led to the one-time pad, a provably unbreakable cipher.
Caesar cipher, each letter of the alphabet is shifted along some number of places; for example, in a Caesar cipher of shift 3, A would become D, B would become E and so on. The Vigenère cipher consists of several Caesar ciphers in sequence with different shift values.
To encipher, a table of alphabets can be used, termed a "
tabula recta", "Vigenère square", or "Vigenère table". It consists of the alphabet written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers. At different points in the encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each point depends on a repeating keyword.
For example, suppose that the
plaintextto be encrypted is::ATTACKATDAWNThe person sending the message chooses a keyword and repeats it until it matches the length of the plaintext, for example, the keyword "LEMON"::LEMONLEMONLEThe first letter of the plaintext, A, is enciphered using the alphabet in row L, which is the first letter of the key. This is done by looking at the letter in row L and column A of the Vigenère square, namely L. Similarly, for the second letter of the plaintext, the second letter of the key is used; the letter at row E and column T is X. The rest of the plaintext is enciphered in a similar fashion:Decryption is performed by finding the position of the ciphertext letter in a row of the table, and then taking the label of the column in which it appears as the plaintext. For example, in row L, the ciphertext L appears in column A, which taken as the first plaintext letter. The second letter is decrypted by looking up X in row E of the table; it appears in column T, which is taken as the plaintext letter.
Vigenère can also be viewed algebraically. If the letters A–Z are taken to be the numbers 0–25, and addition is performed modulo 26, then Vigenère encryption can be written,
The idea behind the Vigenère cipher, like all polyalphabetic ciphers, is to disguise plaintext
letter frequencies, which interferes with a straightforward application of frequency analysis. For instance, if P is the most frequent letter in a ciphertext whose plaintext is in English, one might suspect that P corresponds to E, because E is the most frequently used letter in English. However, using the Vigenère cipher, E can be enciphered as different ciphertext letters at different points in the message, thus defeating simple frequency analysis.
The primary weakness of the Vigenère cipher is the repeating nature of its key. If a cryptanalyst correctly guesses the key's length, then the cipher text can be treated as interwoven
Caesar ciphers, which individually are easily broken. The Kasiski and Friedman tests can help determine the key length.
:"For more details on this topic, see
Friedrich Kasiskiwas the first to "publish" a successful attack on the Vigenère cipher, but Charles Babbagehad already developed the same test in 1854. Babbage was goaded into breaking the Vigenère cipher when John Hall Brock Thwaites submitted a "new" cipher to the Journal of the Society of the Arts; when Babbage showed that Thwaites' cipher was essentially just another recreation of the Vigenère cipher, Thwaites challenged Babbage to break his cipher. Babbage succeeded in decrypting a sample, which turned out to be the poem "The Vision of Sin", by Alfred Tennyson, encrypted according to the keyword "Emily", the first name of Tennyson's wife. [cite book|first=Simon|last=Singh|year=1999|title=The Code Book|chapter=Chapter 2: Le Chiffre Indéchiffrable|editor=|pages=63–78|publisher= Anchor Book, Random House|id=ISBN 0-385-49532-3] .
Kasiski examination, also called the Kasiski test, takes advantage of the fact that certain common words like "the" will, by chance, be encrypted using the same key letters, leading to repeated groups in the ciphertext. For example, a message encrypted with the keyword ABCDEF might not encipher "crypto" the same way each time it appears in the plain text:
Key: ABCDEF AB CDEFA BCD EFABCDEFABCD Plaintext: CRYPTO IS SHORT FOR CRYPTOGRAPHY Ciphertext: CSASXT IT UKSWT GQU GWYQVRKWAQJB
The encrypted text here will not have repeated sequences that correspond to repeated sequences in the plaintext. However, if the key length is different, as in this example:
Key: ABCDAB CD ABCDA BCD ABCDABCDABCD Plaintext: CRYPTO IS SHORT FOR CRYPTOGRAPHY Ciphertext: CSASTP KV SIQUT GQU CSASTPIUAQJB
then the Kasiski test is effective. Longer messages make the test more accurate because they usually contain more repeated ciphertext segments. The following ciphertext has several repeated segments and allows a cryptanalyst to discover its key length: Ciphertext: DYDUXRMHTVDVNQDQNWDYDUXRMHARTJGWNQDThe distance between the repeated DYDUXRMHs is 18. This, assuming that the repeated segments represent the same plaintext segments, implies that the key is 18, 9, 6, 3, or 2 characters long. The distance between the NQDs is 20 characters. This means that the key length could be 20, 10, 5, 4, or 2 characters long (all factors of the distance are possible key lengths – a key of length one is just a simple
shift cipher, where cryptanalysis is much easier). By taking the intersection of these sets one could safely conclude that the key length is (almost certainly) 2.
The Friedman test (sometimes known as the kappa test) was invented during the 1920s by
William F. Friedman. Friedman used the index of coincidence, which measures the unevenness of the cipher letter frequencies, to break the cipher. By knowing the probability that any two randomly chosen source-language letters are the same (around 0.067 for monocase English) and the probability of a coincidence for a uniform random selection from the alphabet (1/26 = 0.0385 for English), the key length can be estimated as:
from the observed coincidence rate
where "c" is the size of the alphabet (26 for English), "N" is the length of the text, and "n"1 through "n""c" are the observed ciphertext
letter frequencies, as integers.
This is, however, only an approximation whose accuracy increases with the size of the text. It would in practice be necessary to try various key lengths close to the estimate. [cite book |editor=Henk C.A. van Tilborg |title=Encyclopedia of Cryptography and Security |publisher=Springer |edition=First edition |id=ISBN 038723473X |pages=115 |year=2005] A better approach for repeating-key ciphers is to copy the ciphertext into rows of a matrix having as many columns as an assumed key length, then compute the average index of coincidence with each column considered separately; when this is done for each possible key length, the highest average I.C. then corresponds to the most likely key length. [cite journal | author=Mountjoy, Marjorie | title= The Bar Statistics | journal=NSA Technical Journal | year=1963 | volume=VII | issue=2,4 Published in two parts.] Such tests may be supplemented by information from the Kasiski examination.
Once the length of the key is known, the ciphertext can be rewritten into that many columns, with each column corresponding to a single letter of the key. Each column consists of plaintext that has been encrypted by a single
Caesar cipher; the Caesar key (shift) is just the letter of the Vigenère key that was used for that column. Using methods similar to those used to break the Caesar cipher, the letters in the ciphertext can be discovered.
An improvement to the Kasiski examination, known as Kerckhoffs' method, matches each column's letter frequencies to shifted plaintext frequencies to discover the key letter (Caesar shift) for that column. Once every letter in the key is known, the cryptanalyst can simply decrypt the ciphertext and reveal the plaintext. [cite web |url=http://courses.umass.edu/cs415/labs/lab1/415-lab1-crypto.pdf |title=Lab exercise: Vigenere, RSA, DES, and Authentication Protocols |accessdate=2006-11-10 |format=PDF |work=CS 415: Computer and Network Security ] Kerckhoffs' method is not applicable when the Vigenère table has been scrambled, rather than using normal alphabetic sequences, although Kasiski examination and coincidence tests can still be used to determine key length in that case.
The running key variant of the Vigenère cipher was also considered unbreakable at one time. This version uses as the key a block of text as long as the plaintext. Since the key is as long as the message the Friedman and Kasiski tests no longer work (the key is not repeated). In 1920, Friedman was the first to discover this variant's weaknesses. The problem with the running key Vigenère cipher is that the cryptanalyst has statistical information about the key (assuming that the block of text is in a known language) and that information will be reflected in the ciphertext.
If using a key which is truly random, is at least as long as the encrypted message and is used only once, the Vigenère cipher is theoretically unbreakable. However, in this case it is the key, not the cipher, which provides cryptographic strength and such systems are properly referred to collectively as
one time padsystems, irrespective of which ciphers are employed.
Vigenère actually invented a stronger cipher: an
autokey cipher. The name "Vigenère cipher" became associated with a simpler polyalphabetic cipher instead. In fact, the two ciphers were often confused, and both were sometimes called "le chiffre indéchiffrable". Babbage actually broke the much stronger autokey cipher, while Kasiski is generally credited with the first published solution to the fixed-key polyalphabetic ciphers.
A simple variant is to encrypt using the Vigenère decryption method, and decrypt using Vigenère encryption. This method is sometimes referred to as "Variant Beaufort". This is different from the
Beaufort cipher, created by Sir Francis Beaufort, which nonetheless is similar to Vigenère but uses a slightly modified enciphering mechanism and tableau. The Beaufort cipher is a reciprocal cipher.
Despite the Vigenère cipher's apparent strength it never became widely used throughout
Europe. The Gronsfeld cipher is a variant created by Count Gronsfeld which is identical to the Vigenère cipher, except that it uses just 10 different cipher alphabets (corresponding to the digits 0 to 9). The Gronsfeld cipher is strengthened because its key is not a word, but it is weakened because it has just 10 cipher alphabets. Gronsfeld's cipher did become widely used throughout Germany and Europe, despite its weaknesses.
*cite book|first=Albrecht|last=Beutelspacher|year=1994|title=Cryptology|chapter=Chapter 2|editor=|others=translation from German by J. Chris Fisher|pages=27-41|publisher=|id=ISBN 0-88385-504-6
*cite book|first=Simon|last=Singh|year=1999|title=The Code Book|chapter=Chapter 2: Le Chiffre Indéchiffrable|editor=|pages=|publisher=Anchor Book,
Random House|id=ISBN 0-385-49532-3
*cite book|first=Helen Fouche|last=Gaines|year=1939|title=Cryptanalysis a Study of Ciphers and Their Solutions|chapter=The Gronsfeld, Porta and Beaufort Ciphers|editor=|pages=117-126|publisher=
Dover Publications|id=ISBN 0486200973Mendelsohn, Charles J. (1940). "Blaise De Vigenere and The "Chiffre Carre"," "Proceedings of the American Philosophical Society" 82, no. 2
* [http://home.att.net/~tleary/cryptolo.htm History of the cipher from Cryptologia]
* [http://www.bbc.co.uk/dna/h2g2/alabaster/A613135 Basic Cryptanalysis] at H2G2
* [http://www-math.cudenver.edu/~wcherowi/courses/m5410/m5410cc.html Lecture Notes on Classical Cryptology including an explanation and derivation of the Friedman Test]
* [http://sharkysoft.com/misc/vigenere/ Sharky's Online Vigenere Cipher] — Encode and decode messages, using a known key, within a Web browser (
* [http://smurfoncrack.com/pygenere/ PyGenere: an online tool for automatically deciphering Vigenère-encoded texts] (6 languages supported)
* [http://thutt.mine.nu/vigenerecgi.cgi Tim's Vigenère Cracker] Another tool for automatic decyphering using an entropy-based approach. English only.
* [http://search.cpan.org/~alizta/Crypt-Vigenere-0.07/Vigenere.pm Crypt::Vigenere] — a
CPANmodule implementing the Vigenère cipher
* [http://www.perlmonks.org/?node_id=550450 Breaking the indecipherable cipher: Perl code to decipher Vigenère text, with the source in the shape of Babbage's head]
* [http://www.leafraker.com/yavi/ Vigenère Cipher, an implementation] - Sources in Java and C (GNU GPL)
* [http://teutoburgo.web44.net/java/indexJavaEn.html Java Vigenere applet] with source code (GNU GPL)
* [http://buchananweb.co.uk/security27.aspx Random Vigenère Challenges]
Wikimedia Foundation. 2010.
Look at other dictionaries:
vigenère cipher — |vēzhə|ne(ə)r noun Usage: usually capitalized V Etymology: after Blaise de Vigénère died 1596 French diplomat and student of cryptography : polyalphabetic substitution with alphabets derived from one pair of primary alphabets by sliding (as in… … Useful english dictionary
Vigenère — can be: *Blaise de Vigenère, a 16th century French cryptographer *The Vigenère cipher, a cipher whose invention was later misattributed to Vigenère … Wikipedia
vigenère tableau — noun also vigenère table or vigenère square Usage: usually capitalized V Etymology: after B. de Vigénère : a square cipher table formed by placing the same normal or mixed primary alphabet one step farther to the left on each successive line and… … Useful english dictionary
cipher square — noun : vigenère tableau … Useful english dictionary
Substitution cipher — In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters,… … Wikipedia
Classical cipher — A cipher is a means of concealing a message, where letters of the message are substituted or transposed for other letters, letter pairs, and sometimes for many letters. In cryptography, a classical cipher is a type of cipher that was used… … Wikipedia
Caesar cipher — The action of a Caesar cipher is to replace each plaintext letter with one fixed number of places down the alphabet. This example is with a shift of three, so that a B in the p … Wikipedia
Blaise de Vigenère — (April 5, 1523 1596) was a French diplomat and cryptographer. The Vigenère cipher is so named due to the cipher being incorrectly attributed to him in the 19th century.Vigenère (IPA: viːdʒ ɪ nɛəɹ veez ih nair ) was born in the village of Saint… … Wikipedia
Beaufort cipher — The Beaufort cipher, created by Sir Francis Beaufort, is a substitution cipher that is similar to the Vigenère cipher but uses a slightly modified enciphering mechanism and tableau.Using the cypherTo encrypt (or decrypt for that matter), first… … Wikipedia
National Cipher Challenge — The National Cipher Challenge is an annual cryptographic competition organised by the University of Southampton School of Mathematics. Competitors attempt to break cryptograms published on the competition website. In the 2007/08 challenge, 1301… … Wikipedia