# Vernam Cipher in Cryptography

**Vernam Cipher** is a method of encrypting alphabetic text. It is simply a type of substitution cipher. In this mechanism we assign a number to each character of the Plain-Text, like (a = 0, b = 1, c = 2, … z = 25).

**Method to take key:**

In Vernam cipher algorithm, we take a key to encrypt the plain text which length should be equal to the length of the plain text.

**Encryption Algorithm:**

- Assign a number to each character of the plain-text and the key according to alphabetical order.
- Add both the number (Corresponding plain-text character number and Key character number).
- Subtract the number from 26 if the added number is greater than 26, if it isn’t then leave it.

**Example:**

Plain-Text:RAMSWARUPKKey:RANCHOBABA

Now according to our encryption algorithm we assign a number to each character of our plain-text and key.

PT:R A M S W A R U P KNO:17 0 12 18 22 0 17 20 15 10KEY:R A N C H O B A B ANO:17 0 13 2 7 14 1 0 1 0

Now add the number of Plain-Text and Key and after doing the addition and subtraction operation (if required), we will get the corresponding Cipher-Text character number.

CT-NO:34 0 25 20 29 14 18 20 16 10

In this case, there are two numbers which are greater than the 26 so we have to subtract 26 from them and after applying the subtraction operation the new Cipher text character numbers are as follow:

CT-NO:8 0 25 20 3 14 18 20 16 10

New Cipher-Text is after getting the corresponding character from the number.

CIPHER-TEXT:I A Z U D O S U Q K

**Note:**

For the *Decryption* apply the just reverse process of encryption.

## Recommended Posts:

- Bifid Cipher in Cryptography
- Caesar Cipher in Cryptography
- Custom Building Cryptography Algorithms (Hybrid Cryptography)
- Classical Cryptography and Quantum Cryptography
- Difference between Block Cipher and Stream Cipher
- Difference between Substitution Cipher Technique and Transposition Cipher Technique
- DNA Cryptography
- Development of Cryptography
- Quantum Cryptography
- Cryptography and its Types
- The CIA triad in Cryptography
- RSA Algorithm in Cryptography
- Birthday attack in Cryptography
- Easy Key Management in Cryptography
- Difference between Steganography and Cryptography

If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to contribute@geeksforgeeks.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.

Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.