Vernam Cipher is a method of encrypting alphabetic text. It is simply a type of substitution cipher. In this mechanism we assign a number to each character of the Plain-Text, like (a = 0, b = 1, c = 2, … z = 25).
Method to take key:
In Vernam cipher algorithm, we take a key to encrypt the plain text which length should be equal to the length of the plain text.
- Assign a number to each character of the plain-text and the key according to alphabetical order.
- Add both the number (Corresponding plain-text character number and Key character number).
- Subtract the number from 26 if the added number is grater than 26. otherwise left it.
Plain-Text: RAMSWARUPK Key: RANCHOBABA
Now according to our encryption algorithm we assign a number to each character of our plain-text and key.
PT: R A M S W A R U P K NO: 17 0 12 18 22 0 17 20 15 10 KEY: R A N C H O B A B A NO: 17 0 13 2 7 14 1 0 1 0
Now add the number of Plain-Text and Key and after doing the addition and subtraction operation (if required), we will get the corresponding Cipher-Text character number.
CT-NO: 34 0 25 20 29 14 18 20 16 10
In this case, there are two numbers which are greater than the 26 so we have to subtract 26 from them and after applying the subtraction operation the new Cipher text character numbers are as follow:
CT-NO: 8 0 25 20 3 14 18 20 16 10
New Cipher-Text is after getting the corresponding character from the number.
CIPHER-TEXT: I A Z U D O S U Q K
For the Decryption apply the just reverse process of encryption.
- Caesar Cipher in Cryptography
- Bifid Cipher in Cryptography
- Custom Building Cryptography Algorithms (Hybrid Cryptography)
- Classical Cryptography and Quantum Cryptography
- Difference between Block Cipher and Stream Cipher
- Difference between Substitution Cipher Technique and Transposition Cipher Technique
- DNA Cryptography
- Cryptography and its Types
- Quantum Cryptography
- Development of Cryptography
- RSA Algorithm in Cryptography
- The CIA triad in Cryptography
- Difference between Steganography and Cryptography
- Easy Key Management in Cryptography
- Birthday attack in Cryptography
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.