Skip to content
This repository has been archived by the owner on Jun 5, 2018. It is now read-only.
/ Ciphers Public archive

This repository consists of ciphers and deciphers. It can help you to cipher your message if you don't want that somebody else can read it . Ciphers: Atbash, Caesar cipher, Vigenère cipher.

Notifications You must be signed in to change notification settings

lpavliuk/Ciphers

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Ciphers

This repository consists of ciphers and deciphers. It can help you to cipher your message if you don't want that somebody else can to read it .

Ciphers:

  • Atbash,

  • Caesar cipher,

  • Vigenère cipher.

Atbash

Atbash is a monoalphabetic substitution cipher originally used to encode the Hebrew alphabet. It can be modified for use with any known writing system with a standard collating order. The Atbash cipher is a particular type of monoalphabetic cipher formed by taking the alphabet and mapping it to its reverse, so that the first letter becomes the last letter, the second letter becomes the second to last letter, and so on.

For example, the Latin alphabet would work like this:

A -> Z, B -> Y, C -> X, etc.

Caesar cipher

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

For example, with a shift of 3 (the shift parameter is used as the key):

A -> D, B -> E, C -> F and so on.

The method is named after Julius Caesar, who used it in his private correspondence.

Vigenère cipher

The Vigenère cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers based on the letters of a keyword. It is a form of polyalphabetic substitution.

For example, suppose that the plaintext to be encrypted is:

ATTACKATDAWN

The person sending the message chooses a keyword and repeats it until it matches the length of the plaintext, for example, the keyword "LEMON":

LEMONLEMONLE

Each row starts with a key letter. The remainder of the row holds the letters A to Z (in shifted order). Although there are 26 key rows shown, one will only use as many keys (different alphabets) as there are unique letters in the key string, here just 5 keys, {L, E, M, O, N}. For successive letters of the message, we are going to take successive letters of the key string, and encipher each message letter using its corresponding key row. Choose the next letter of the key, go along that row to find the column heading that matches the message character; the letter at the intersection of [key-row, msg-col] is the enciphered letter.

For example, the first letter of the plaintext, A, is paired with L, the first letter of the key. So use row L and column A of the Vigenère square, namely L. Similarly, for the second letter of the plaintext, the second letter of the key is used; the letter at row E and column T is X. The rest of the plaintext is enciphered in a similar fashion:

Plaintext: ATTACKATDAWN

Key: LEMONLEMONLE

Ciphertext: LXFOPVEFRNHR

Decryption is performed by going to the row in the table corresponding to the key, finding the position of the ciphertext letter in this row, and then using the column's label as the plaintext. For example, in row L (from LEMON), the ciphertext L appears in column A, which is the first plaintext letter. Next we go to row E (from LEMON), locate the ciphertext X which is found in column T, thus T is the second plaintext letter.

About

This repository consists of ciphers and deciphers. It can help you to cipher your message if you don't want that somebody else can read it . Ciphers: Atbash, Caesar cipher, Vigenère cipher.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published