Skip to main content

The Vignere cipher

The Vignere cipher is a method of encryption which uses caesar cipher on each letter based on the letters of keyword.In caeser cipher each letter of the plaintext is shifted number of tomes depending upon the key value for examlple if the key=2 then the letter A is shifted two times and encrypted as C.Vignere cipher uses this technique on each of the letters but with different keys each time.That is the reason it appears unbreakable at first.But it is quite easy to understand and implement.

For encrypting the plaintext vignere cipher uses vignere square or tabula recta which is like 26 X 26 table consisting of alphabets A-Z on ech row and columns.The columns in a table are such that each next column first alphabet is obtained by shifting previous column alphabet by one.

Here is the figure of vignere square or tabular recta



For the Encryption process the cipher uses different alphabets from the rows each time depending upon the alphabet key is having.So the process of encryption is quite simple.

Lets take the plaintext be ILOVETHISBLOG

Now for encryption process one has to take certain keyword or key of any length.Lets assume that you are encrypting the plaintext with the keyword AGREED.Now you can see that the length of keyword and plaintext is not same.So in vignere cipher if the length of key and plaintext are not same then we repeat the keyword until its length become same as plaintext.

To do that we are going to repeat the keyword again from start after the last alphabet of key.So now it will be like AGREEDAGREEDA

Now comes the part of encryption the plaintext.For encryption one has to see the vignere square and take the first alphabet of plaintext and keyword and use it as a column and row respectively.For example I is taken from plaintext and A is taken from keyword.Now see the entry corresponding to column I and row A.The value in that entry will be substituted in the first place of cipher.So the value for column I and Row A will be J.Similarly repeating the above process for every alphabet will yeild encrypted text.

Plaintext    : I L O V E T H I S B L O G

Keyword : A G R E E D A G R E E D A

Cipher     : J S G A J X I P K G Q S H

The recipient of the message should know the key before hand for decrypting the code.

There is another method used in vignere cipher which is even more complex to decrypt.In this technique the keyword is taken as same as plaintext to encrypt but include one special alphabet at the beginning of keyword which is called as the priming letter.

So for the plaintext ILOVETHISBLOG.The keyword will be KILOVETHISBLO where "K" is the priming letter.The priming letter should be known to both the sender and recipient , only then he will be able to decrypt the code.

This method is generally not used as it is little bit difficult to crack and time consuming.


Comments

Popular posts from this blog

Tricky Questions or Puzzles in C ( Updated for 2026)

Updated for 2026 This article was originally written when C/C++ puzzles were commonly asked in interviews. While such language-specific puzzles are less frequent today, the problem-solving and logical reasoning skills tested here remain highly relevant for modern Software Engineering, Data Engineering, SQL, and system design interviews . Why These Puzzles Still Matter in 2026 Although most Software &   Data Engineering interviews today focus on Programming, SQL, data pipelines, cloud platforms, and system design , interviewers still care deeply about how you think . These puzzles test: Logical reasoning Edge-case handling Understanding of execution flow Ability to reason under pressure The language may change , but the thinking patterns do not . How These Skills Apply to Data Engineering Interviews The same skills tested by C/C++ puzzles appear in modern interviews as: SQL edge cases and NULL handling Data pipeline failure scenarios Incremental vs ...

Program to uncompress a string ie a2b3c4 to aabbbcccc

Below is the program to uncompress a string #include<stdio.h> #include<conio.h> #include<stdlib.h> int main() { char str[100]="a2b3c4d8u7"; for(int i=0;str[i]!='\0';i++) { if(i%2!=0) { for(int j=0;j<atoi(&str[i]);j++) { printf("%c",str[i-1]); } } } getch(); } Want to become a Data Engineer? Check out below blog posts  1.  5 Key Skills Every Data Engineer needs in 2023 2.  How to prepare for Data Engineering Interviews 3.  Top 25 Data Engineer Questions

Programs and Puzzles in technical interviews i faced

I have attended interview of nearly 10 companies in my campus placements and sharing their experiences with you,though i did not got selected in any of the companies but i had great experience facing their interviews and it might help you as well in preparation of interviews.Here are some of the puzzles and programs asked to me in interview in some of the good companies. 1) SAP Labs I attended sap lab online test in my college through campus placements.It had 3 sections,the first one is usual aptitude questions which i would say were little tricky to solve.The second section was Programming test in which you were provided snippet of code and you have to complete the code (See Tricky Code Snippets  ).The code are from different data structures like Binary Tree, AVL Tree etc.Then the third section had questions from Database,OS and Networks.After 2-3 hours we got the result and i was shortlisted for the nest round of interviews scheduled next day.Then the next day we had PPT of t...