CAESAR’S & VIGENÈRE | CIPHERS | CRYPTOGRAPHY

Caesar, Vigenère, and a Lesson in Basic Cryptography

Exploring two historical ciphers and how they paved the way for modern encryption.

Matt Connors
3 min readDec 12, 2024
Photo by Towfiqu barbhuiya on Unsplash

From Ancient Rome to modern cybersecurity, cryptography has been a cornerstone of secure communication for millennia, and today, we’ll take a look at some of history’s most well-known cryptographic methods.

In this article, we will explore two historical ciphers: Caesar’s Cipher and the Vigenère Cipher, mainly tackling the former, and comparing them.

The Caesar Cipher

The Caesar Cipher is one of the first examples of cryptography being used to protect communications and, in those days especially, soldiers’ lives.

This is what’s known as a substitution cipher, meaning that each character of a text has a correspondent character.

This specific cipher involves shifting the alphabet a certain number of letters either to the left or to the right depending on your preference.

For example, for a key of 3 — or the number of shifts — and shifting left, by shifting the text for Hello we get Ebiil.

Here’s a little challenge for you, try to decode Khoor (Hint: shift 3 letters to the left this time). You can share your answers in the comments!

Alphabet Shifts (Examples)

In order, the right-shifted alphabet with a key of 3 is:

  • D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z, A, B, C,
  • This alphabet was right shifted 3 times (a key of value 3).

In order, the normal English alphabet is:

  • A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z

In order, the left-shifted alphabet with a key of 3 is:

  • X, Y, Z, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W
  • This alphabet was left shifted 3 times (a key of value 3).

The Vigenère Cipher

This 15th century cipher first described by Leon Battista Alberti is a big step up from the former in terms of security.

We won’t go in-depth on this cipher’s algorithm, just know that it is significantly more secure, using a key made up of letters (possible combinations for the key are 26^n with n representing the length of the key) rather than the number of letters in an alphabet (only 26 combinations).

Using this cipher, we can encrypt the string Hello, World! using the key PASS to get Weddd, Wgjad!

As you can see, this even looks harder than Caesar’s. Given that the letters are no longer tied to one specific correspondent but rather the ciphertext is determined by a combination of the key and the plaintext.

This cipher has been used before in actual combat. Notably, the Confederate States of America used a version of it to encrypt its communications, but the fact they only used a few different keys during the whole war meant that the Union was able to break their codes most of the time.

Caesar v. Vigenère, The Key Differences

The Vigenère Cipher, with its more complicated nature, is a great way to encrypt information you don’t want to be understood, although it is itself very vulnerable given a bit of time.

Caesar’s Cipher, although much less sophisticated and much easier to crack, has become an entry point for many enthusiasts into cryptography, mainly due to its increased popularity due to shows like Gravity Falls and different internet mysteries which have garnered it popularity.

From Ancient Rome to 15th century France, Nazi Germany’s Enigma and, today, ciphers like the AES256 encryption standard, cryptography has come a very long way, and it will only get better as old methods begin to show their cracks.

To wrap things up, I would like you, the reader, to try and encrypt some messages using these two ciphers. Maybe leave them in the comments down below too and see if others can decrypt them.

Acknowledgements

The author used some AI tools in order to create this article.

AI tools used:

  • ChatGPT: Outlining and refining sentences for readability.

--

--

Matt Connors
Matt Connors

Written by Matt Connors

0 Followers

Tech enthusiast sharing science, modern history and occasionally social issues

No responses yet