Introduction to Cryptography Lab 2
Script to encode and decode
def vigenere_cipher(text, key):
encoded_text = []
# Empty array for encoded text
key_as_int = [ord(i) for i in key]
# Convert the key to ascii using ORD Function
# ord() function returns the ASCII value of the character
# using for inside a list iterates the key and converts it to ascii value and stores it in the list
text_as_int = [ord(i) for i in text]
# get the ordinal for each character in the text and store it in a list
# Convert the text to ascii using ORD Function
# ord() function returns the ASCII value of the character
# using for inside a list iterates the text and converts it to ascii value and stores it in the list
for i in range(len(text_as_int)):
if text_as_int[i] == 32:
# check if the text is a space
encoded_text.append(" ")
# append the space to the encoded text
continue
else:
# Iterate through the text
value = (text_as_int[i] + key_as_int[i % len(key)]) % 26
# calculate the value of encoded key
encoded_text.append(chr(value + 65))
# Append 65 to the value to convert into ASCII value
return ''.join(encoded_text)
def inverse_vignere_cipher(encoded_text,key):
real_text = []
# Empty array for real text
key_length = len(key)
# length of the array stored
key_as_int=[ord(i) for i in key]
# Convert the key to ascii using ORD Function
encoded_text_as_int = [ord(i) for i in encoded_text]
for i in range(len(encoded_text_as_int)):
if encoded_text_as_int[i] == 32:
# check if the encoded text is a space
real_text.append(" ")
# append the space to the real text
continue
else:
value = (encoded_text_as_int[i]-key_as_int[i%len(key)])%26
# calculate the value of encoded key
real_text.append(chr(value+65))
# Append 65 to the value to convert into ASCII value
return ''.join(real_text)
key=input("Enter the key: ").upper()
plaintext = input("Enter the Plain Text: ").upper()
encoded_text = vigenere_cipher(plaintext, key)
decoded_text = inverse_vignere_cipher(encoded_text,key)
print("encoded text:",encoded_text)
print("decoded text:",decoded_text)
Questions
1. Is the 16th century - Vigenere Cipher still worthy? Justify? When the key and message are short the vigenere’s cipher is easy to be bruteforced. The iterations required will be . To solve this problem we have to make the message longer and key too. However with longer text phrases due to the nature of language words will be repetitive. And that leads to easy giveaways. 2. What is the common types of attacks on Vigenere Cipher? - Frequency Analysing : By analyzing the frequency of letters in the cipher text, it’s possible to identify repeating patterns that correspond to the length of the key. - Kasiski Examination: This method involves finding repeated sequences of letters in the cipher text. The distance between these repetitions can help deduce the key length. - Babbage’s Method: Similar to the Kasiski Examination, this method also looks for repeated sequences. Babbage’s insight was to note that the distances between these sequences are often multiples of the key length. 3. Discuss the impact of the key length on the security of the Vigenère cipher. Why does a longer key generally provide better security? The key length being longer means the length increases. With the increase in length The iterations required will be . Thus exponentially increasing the iterations required. 4. What is difference of autokey method and keyword method of Vigenere Cipher? - Key Generation: The key is a single keyword that is repeated to match the length of the plaintext. For example, if the keyword is “KEY” and the plaintext is “HELLO”, the key would be repeated as “KEYKE”. - Encryption/Decryption: Each letter of the plaintext is shifted according to the corresponding letter of the repeated keyword. This can make the encryption more secure than a simple Caesar cipher, but it is still vulnerable to frequency analysis attacks.
References
Information
- date: 2025.01.13
- time: 13:12