{"id":2811,"date":"2021-10-10T21:48:09","date_gmt":"2021-10-10T21:48:09","guid":{"rendered":"https:\/\/computerscienced.co.uk\/site\/?page_id=2811"},"modified":"2022-12-03T20:53:17","modified_gmt":"2022-12-03T20:53:17","slug":"vigenere-cipher","status":"publish","type":"page","link":"https:\/\/computerscienced.co.uk\/site\/vigenere-cipher\/","title":{"rendered":"Vigenere Cipher"},"content":{"rendered":"\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:21% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"866\" height=\"637\" src=\"https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2021\/09\/undraw_secure_files_re_6vdh.svg\" alt=\"\" class=\"wp-image-2591 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-normal-font-size\">The Vigenere cipher is a  great example of a more advanced type of substitution cipher.  It takes the idea of the Caesar Cipher and makes it a lot more difficult to decrypt by combining multiple Caesar Cipher substitutions and shifts into a single encrypted text.  <\/p>\n\n\n\n<p>There are 2 ways to encrypt and decrypt a Vigenere Cipher:<\/p>\n\n\n\n<p>Method 1 is by using a grid<\/p>\n\n\n\n<p>Method 2 is by using a Caesar cipher wheel <\/p>\n\n\n\n<p class=\"has-normal-font-size\"> <\/p>\n<\/div><\/div>\n\n\n\n<p>Below we have some resources to help tell you more about the cipher and also some encryption and decryption exercise using the Vigenere cipher with our online Caesar Cipher Wheel <\/p>\n\n\n\n<h2 class=\"has-white-color has-vivid-cyan-blue-background-color has-text-color has-background wp-block-heading\">Vigenere Cipher exercises <\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/computerscienced.co.uk\/site\/vigenere-cipher-encryption\/\">Vigenere Cipher encryption<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Try encrypting some computer science keywords using the Vignere Cipher and a Key Phrase<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/computerscienced.co.uk\/site\/vigenere-cipher-decryption\/\">Vigenere Cipher decryption<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p> Try encrypting some computer science keywords using the Vignere Cipher and a Key Phrase <\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"has-white-color has-vivid-cyan-blue-background-color has-text-color has-background wp-block-heading\">More<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/computerscienced.co.uk\/site\/vigenere-cipher\/what-is-the-vignere-cipher\/\">What is the Vigenere Cipher?<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>An explanation of how the Vigenere cipher works and a little of its history.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/computerscienced.co.uk\/site\/vigenere-cipher\/vigenere-cipher-grid\/\">Vigenere Grid<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Want to try and work with a grid instead? Use this to print off a grid to work with.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Vigenere cipher is a great example of a more advanced type of substitution cipher. It takes the idea of&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2591,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"disable_featured_image":true,"footnotes":""},"class_list":["post-2811","page","type-page","status-publish","has-post-thumbnail","hentry"],"blog_post_layout_featured_media_urls":{"thumbnail":["https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2021\/09\/undraw_secure_files_re_6vdh.svg",150,150,true],"full":["https:\/\/computerscienced.co.uk\/site\/wp-content\/uploads\/2021\/09\/undraw_secure_files_re_6vdh.svg",866,637,false]},"categories_names":null,"comments_number":"0","_links":{"self":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/2811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/comments?post=2811"}],"version-history":[{"count":23,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/2811\/revisions"}],"predecessor-version":[{"id":6044,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/pages\/2811\/revisions\/6044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/media\/2591"}],"wp:attachment":[{"href":"https:\/\/computerscienced.co.uk\/site\/wp-json\/wp\/v2\/media?parent=2811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}