search
HomeWeb Front-endJS TutorialJavaScript implementation of Vigenere cryptographic algorithm example_javascript skills

Traditional encryption technologies cannot play a big role in today's network security, but they will be introduced at the beginning of every book about cryptography, because they are the basis of cryptography and the history of cryptography. Almost every cryptography book in the chapter about the Vigenere cipher will have a "Vigenere Substitution Table" user explaining the Vigenere cipher mechanism:

JavaScript implementation of Vigenere cryptographic algorithm example_javascript skills

The encryption process is very simple, that is, given the key letter x and the plaintext letter y, the ciphertext letter is the letter located in the x row and y column. This determines that encrypting a message requires a key string as long as the message. Typically, the key string is a repetition of the key word.
Using the example in "Cryptography and Network Security - Principles and Practice" as an example in this article. For example, if the key word is deceptive and the message is "we are discovered save yourself", then the encryption process is as follows:

Copy code The code is as follows:

deceptivedeceptivedeceptive(key string)
wearediscoveredsaveyourself( Message)
ZICVTWQNGRZGVTWAVZHCQYGLMGJ (ciphertext)

How did you get the first letter "Z" in the ciphertext? From the Vigenere substitution table, the letter with "d" in the key string as the row and "w" in the message as the column is "Z".

Using the lookup table method to encrypt a few times, you can easily summarize the rules: number A~Z from 0~25, then the encryption process is to find the message letters in the first row of the substitution table, such as "w", and then move backward d (that is, 3) times, the resulting letter is the ciphertext. If the count reaches the end, the next shift will continue from the beginning (i.e. A). In other words, A~Z can be regarded as a ring. The encryption process is to shift the pointer in a specific direction of the ring after determining the message letter. The number of times is the number represented by the key letter. This is actually a modulo 26 process.
To expand, the above encryption can only encrypt 26 letters and is not case-sensitive. But in fact, in addition to letters, English also has punctuation marks and spaces. If most English characters are taken into account, the Vigenere substitution table will be relatively large and a bit of a waste of space. If it is assumed that there are N characters that can be encrypted, and if these N characters are built into a ring, then the encryption process is a process modulo N, that is, C(i)=(K(i) P(i))modN, where K, C, and P represent the key space, ciphertext space, and message (plaintext) space respectively.
Some people on the Internet have implemented this encryption algorithm in C, and almost all of them use the lookup and substitution table method. Although the substitution table can be generated programmatically, the generated substitution table is too regular. I implemented the following using Javascript, using the module method. It feels more flexible and definitely takes up less space (the time efficiency has not yet been estimated)

Copy code The code is as follows:

var Vigenere = {
_strCpr: 'abcdefghijklmnopqrstuvwxyz_12345 67890.ABCDEFGHIJKLMNOPQRSTUVWXYZ',//You can disrupt the order of this string or add more characters
_strKey: function(strK,str ){//Generate key string, strK is the key, str is the plaintext or ciphertext
var lenStrK = strK.length;
var lenStr = str.length;
if(lenStrK != lenStr ) {// If the key length is different from STR, you need to generate a key string. Key string
while(lenStrK strK = strK strK;
lenStrK = 2 * lenStrK;
}
}//At this time, the length of the key string Greater than or equal to the length of str
                                                                                                                                                                  using         using         using       using   using   using     using     using   using   using   using   using using using using   through using using using out through out out through out out out out out out out through out out outallow out's ’ s ’ through ’ through ‐ to ‐ ‐ ‐ n r r‐ and 🎜>}

Vigenere.lenCpr = Vigenere._strCpr.length;

Vigenere.Encrypt = function(K,P){//Encryption algorithm, K is the key, P is the plaintext
K = Vigenere._strKey(K,P); var lenK = K.length ;

var rlt = '';

var loop = 0;

for(loop=0; loop var iP = Vigenere._strCpr.indexOf(P.charAt( loop));
if(iP==-1) return 'This algorithm cannot currently encrypt the character: 'P.charAt(loop)';
var iK = Vigenere._strCpr.indexOf(K. charAt(loop));
if(iK==-1) return 'The key contains illegal characters:' K.charAt(loop);
var i = (iP iK) % Vigenere.lenCpr;
rlt = rlt Vigenere._strCpr.charAt(i);
}
return rlt;
};

Vigenere.DisEncrypt = function(K,C){
K = Vigenere._strKey(K,C);
var lenK = K.length;
var rlt = '';

var loop = 0;

for(loop=0; loop var iK = Vigenere._strCpr.indexOf(K.charAt(loop));
if(iK==- 1) return 'The key contains illegal characters:' K.charAt(loop); var iC = Vigenere._strCpr.indexOf(C.charAt(loop));
if(iK > iC){
rlt = Vigenere._strCpr.charAt(iC Vigenere.lenCpr - iK);
}
else{
rlt = Vigenere._strCpr.charAt(iC - iK);
}
}
return rlt;
};


Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
From C/C   to JavaScript: How It All WorksFrom C/C to JavaScript: How It All WorksApr 14, 2025 am 12:05 AM

The shift from C/C to JavaScript requires adapting to dynamic typing, garbage collection and asynchronous programming. 1) C/C is a statically typed language that requires manual memory management, while JavaScript is dynamically typed and garbage collection is automatically processed. 2) C/C needs to be compiled into machine code, while JavaScript is an interpreted language. 3) JavaScript introduces concepts such as closures, prototype chains and Promise, which enhances flexibility and asynchronous programming capabilities.

JavaScript Engines: Comparing ImplementationsJavaScript Engines: Comparing ImplementationsApr 13, 2025 am 12:05 AM

Different JavaScript engines have different effects when parsing and executing JavaScript code, because the implementation principles and optimization strategies of each engine differ. 1. Lexical analysis: convert source code into lexical unit. 2. Grammar analysis: Generate an abstract syntax tree. 3. Optimization and compilation: Generate machine code through the JIT compiler. 4. Execute: Run the machine code. V8 engine optimizes through instant compilation and hidden class, SpiderMonkey uses a type inference system, resulting in different performance performance on the same code.

Beyond the Browser: JavaScript in the Real WorldBeyond the Browser: JavaScript in the Real WorldApr 12, 2025 am 12:06 AM

JavaScript's applications in the real world include server-side programming, mobile application development and Internet of Things control: 1. Server-side programming is realized through Node.js, suitable for high concurrent request processing. 2. Mobile application development is carried out through ReactNative and supports cross-platform deployment. 3. Used for IoT device control through Johnny-Five library, suitable for hardware interaction.

Building a Multi-Tenant SaaS Application with Next.js (Backend Integration)Building a Multi-Tenant SaaS Application with Next.js (Backend Integration)Apr 11, 2025 am 08:23 AM

I built a functional multi-tenant SaaS application (an EdTech app) with your everyday tech tool and you can do the same. First, what’s a multi-tenant SaaS application? Multi-tenant SaaS applications let you serve multiple customers from a sing

How to Build a Multi-Tenant SaaS Application with Next.js (Frontend Integration)How to Build a Multi-Tenant SaaS Application with Next.js (Frontend Integration)Apr 11, 2025 am 08:22 AM

This article demonstrates frontend integration with a backend secured by Permit, building a functional EdTech SaaS application using Next.js. The frontend fetches user permissions to control UI visibility and ensures API requests adhere to role-base

JavaScript: Exploring the Versatility of a Web LanguageJavaScript: Exploring the Versatility of a Web LanguageApr 11, 2025 am 12:01 AM

JavaScript is the core language of modern web development and is widely used for its diversity and flexibility. 1) Front-end development: build dynamic web pages and single-page applications through DOM operations and modern frameworks (such as React, Vue.js, Angular). 2) Server-side development: Node.js uses a non-blocking I/O model to handle high concurrency and real-time applications. 3) Mobile and desktop application development: cross-platform development is realized through ReactNative and Electron to improve development efficiency.

The Evolution of JavaScript: Current Trends and Future ProspectsThe Evolution of JavaScript: Current Trends and Future ProspectsApr 10, 2025 am 09:33 AM

The latest trends in JavaScript include the rise of TypeScript, the popularity of modern frameworks and libraries, and the application of WebAssembly. Future prospects cover more powerful type systems, the development of server-side JavaScript, the expansion of artificial intelligence and machine learning, and the potential of IoT and edge computing.

Demystifying JavaScript: What It Does and Why It MattersDemystifying JavaScript: What It Does and Why It MattersApr 09, 2025 am 12:07 AM

JavaScript is the cornerstone of modern web development, and its main functions include event-driven programming, dynamic content generation and asynchronous programming. 1) Event-driven programming allows web pages to change dynamically according to user operations. 2) Dynamic content generation allows page content to be adjusted according to conditions. 3) Asynchronous programming ensures that the user interface is not blocked. JavaScript is widely used in web interaction, single-page application and server-side development, greatly improving the flexibility of user experience and cross-platform development.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment