Skip to content

Latest commit

 

History

History
71 lines (51 loc) · 3.31 KB

Vigenere_Cipher.md

File metadata and controls

71 lines (51 loc) · 3.31 KB

The Vigenère cipher

Overview

The Vigenère cipher is similar to the Caesar cipher but the key shifts between each letter. This makes frequency analysis more difficult since the same letter in plaintext could be different letters in the cipher text.

Purpose

To use a polyalphabetic cipher to encrypt and decrypt a message. Analyse the security of this cipher.

Objectives

Students will be able to:

  • Use the Vigenère cipher to encrypt/decrypt a message.
  • Explain how frequency analysis would work on this type of encryption.
  • Identify possible weaknesses in the Vigenère cipher and how they might be exploited.

Preparation

Links

  • For the Teacher

  • For the Students

Vocabulary

Teaching Guide

Getting Started

Activity

  • Have students encrypt/decrypt several messages using the Vigenère Square.
  • While students are encrypting, they should be focusing on how patterns emerge and how they might be able to break this code if a keyword was unknown.

Activity

Wrap-up

Discussion:

  • How does this cipher make the code more secure than previously discussed ciphers?
  • What are the primary limitations to this type of encryption?

Video: How Blockchain will Transform Economy

Assessment Questions

  • How recently was the Vigenere cipher used?
  • Why was it so much longer-lived than the Caesar Cipher that it is based on?
  • What is the information leak within the cipher?

Extended Learning

The Codebook - Chapter 2, The Anonymous Codebreaker

As with our first blog post, you should write a post that includes writing, images, links, and other media resources as needed to answer the following questions. The questions should be a guide for your writing but it would be nice if you answered the general questions.

  • How did encryption move from a military application to a more everyday pursuit?
  • What types of purposes did codes and encryption serve?
  • How did people engage in codes as a hobby or interest?
  • Why were solutions to ciphers like Vigenere not published when discovered?
  • What are some other take-aways from this chapter you found interesting?

Standards Alignment

Indiana - CS3S-1.2

Sources:

By Brandon T. Fields (cdated) - Based upon Vigenere-square.png by en:User:Matt Crypto. This version created by bdesham in Inkscape, and modified by cdated to include visual guides.This vector image was created with Inkscape., Public Domain, https://commons.wikimedia.org/w/index.php?curid=15037524

License

Cyber Security Curriculum Creative Commons License is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.