PDF download Download Article PDF download Download Article

The Vigenère cipher is a method of encryption that uses a series of different "Caesar ciphers" based on the letters of a keyword. In a Caesar cipher, each letter in the passage is moved a certain number of letters over, to be replaced by the corresponding letter. For example, this would mean that in a Caesar cipher shift of three: A would become D; B would become E; C would become F etc. A Vigenère cipher builds on this method by using multiple Caesar ciphers at different points in the message; this article shows you how to use it.[1]

Method 1
Method 1 of 2:

Enciphering

PDF download Download Article
  1. [2]
  2. For this example we will use:
    LIME
    Advertisement
  3. For this example, we will use:
    WIKIHOWISTHEBEST
    [3]
  4. Do this until you run out of message:
    WIKIHOWISTHEBEST
    LIMELIMELIMELIME
    [4]
  5. In the example used for this article, the word
    LIME
    fits perfectly but when the keyword is not a perfect fit, there is no need to use the full word. For example:
    WIKIHOWISTHEBESTOFTHEBEST
    LIMELIMELIMELIMELIMELIMEL
  6. Go to the row of the first letter of the keyword in the Vigenère Square and go to the column of the first letter of the actual message and find the intersection point of the row and column. That's your cipher letter.[5]
  7. Using the sample Vigenère square given above, the first ciphertext letter is an H coming from row L and column W. So the ciphertext is:
    HQWMSWIMDBTIMMEX
  8. Advertisement
Method 2
Method 2 of 2:

Deciphering

PDF download Download Article
  1. [6]
  2. Look along it to find the first letter of the ciphered text in that row. Follow the column up to find the first letter of the encoded phrase at the top of the chart.[7]
  3. Advertisement

Community Q&A

Search
Add New Question
  • Question
    What kind of secret texting uses double letters, capital and lowercase?
    MePedro
    MePedro
    Community Answer
    Playfair uses pairs of capital letters. If you want to have lower case letters too, the alphabet of the classic ciphers could be enhanced. All modern ciphers support all kind of characters.
  • Question
    How does W and L equal L? I didn't get that as my answer.
    Community Answer
    Community Answer
    It's not W + L = L, but L + L = W. You take the written L, check with your keyword letter written under (L), and on your board you will find W.
  • Question
    Can Vignere be used in combination with other ciphers (e.g. at-bash or a1z26)?
    Community Answer
    Community Answer
    Yes, for instance: (your message), and if that was z gfxr cvd (not real message) you could just go: z=a, g=t, and so on.
See more answers
Ask a Question
200 characters left
Include your email address to get a message when this question is answered.
Submit
Advertisement

Video

Tips

  • Double check to make sure you encipher correctly. An erroneously enciphered text can be impossible to interpret correctly, and it is difficult to recognize a mistake without a double-check.
  • If you use a larger Vigènere square which includes both punctuation and spacing, the cipher becomes more difficult to break. This is especially so when the "keyword" or "key phrase" is as long or longer than the message. Then you are coming close to a so-called one-time pad.
  • You can automate this with appropriate software for visual programming and check whether you did it correctly.
Show More Tips
Submit a Tip
All tip submissions are carefully reviewed before being published
Name
Please provide your name and last initial
Thanks for submitting a tip for review!
Advertisement

Warnings

  • This cipher is not fool-proof (no cipher is) and can be quickly cracked. By current standards, the Vigenère cipher is extremely weak. Do not use this for anything truly top-secret. For stronger encryption research AES and RSA. This cipher can, however, be used with a one-time pad as a key (a truly random sequence with the same length as the text that is only used once) to produce a ciphertext that, as long as the key is secure, cannot be cracked faster than just doing a brute-force attack.
Advertisement

About This Article

wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 42 people, some anonymous, worked to edit and improve it over time. This article has been viewed 405,333 times.
62 votes - 68%
Co-authors: 42
Updated: November 4, 2024
Views: 405,333
Thanks to all authors for creating a page that has been read 405,333 times.

Did this article help you?

Advertisement