-
-
Notifications
You must be signed in to change notification settings - Fork 772
Vigenere Cipher Explanation added in English language #210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
en/Ciphers/vignere_cipher.md
Outdated
2. There are several key finding methods such as | ||
- [Kasiski examination](https://en.wikipedia.org/wiki/Kasiski_examination) | ||
- [Index of coincidence](https://en.wikipedia.org/wiki/Index_of_coincidence) | ||
3. Once key is found, we can use [frequency analysis](https://en.wikipedia.org/wiki/Frequency_analysis) to crack the cipher. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Once the key length is found.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Otherwise seems to be fine content-wise. Should perhaps point out the relation to the Caeser Cipher?
Made changes and also added fixed spelling errors. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've now done a pass to fix typos and improve the formatting and wording a bit.
Co-authored-by: David Leal <[email protected]>
Co-authored-by: David Leal <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks! 🚀
Description
Provided the explanation for vignere cipher in the cipher directory of the English language. Added brief encryption and decryption algorithm along with an example. Then described the complexity analysis of the scheme. Furthermore, added resources about regarding the cryptanalysis(attack) of the cipher and caution regarding not using it for real life purposes.
Also attached the implementation links in python, C++ and javascript.
Checklist