Home Web Front-end JS Tutorial JavaScript implementation of Vigenere cryptographic algorithm example_javascript skills

JavaScript implementation of Vigenere cryptographic algorithm example_javascript skills

May 16, 2016 pm 05:13 PM
javascript cryptographic algorithm

Traditional encryption technologies cannot play a big role in today's network security, but they will be introduced at the beginning of every book about cryptography, because they are the basis of cryptography and the history of cryptography. Almost every cryptography book in the chapter about the Vigenere cipher will have a "Vigenere Substitution Table" user explaining the Vigenere cipher mechanism:

JavaScript implementation of Vigenere cryptographic algorithm example_javascript skills

The encryption process is very simple, that is, given the key letter x and the plaintext letter y, the ciphertext letter is the letter located in the x row and y column. This determines that encrypting a message requires a key string as long as the message. Typically, the key string is a repetition of the key word.
Using the example in "Cryptography and Network Security - Principles and Practice" as an example in this article. For example, if the key word is deceptive and the message is "we are discovered save yourself", then the encryption process is as follows:

Copy code The code is as follows:

deceptivedeceptivedeceptive(key string)
wearediscoveredsaveyourself( Message)
ZICVTWQNGRZGVTWAVZHCQYGLMGJ (ciphertext)

How did you get the first letter "Z" in the ciphertext? From the Vigenere substitution table, the letter with "d" in the key string as the row and "w" in the message as the column is "Z".

Using the lookup table method to encrypt a few times, you can easily summarize the rules: number A~Z from 0~25, then the encryption process is to find the message letters in the first row of the substitution table, such as "w", and then move backward d (that is, 3) times, the resulting letter is the ciphertext. If the count reaches the end, the next shift will continue from the beginning (i.e. A). In other words, A~Z can be regarded as a ring. The encryption process is to shift the pointer in a specific direction of the ring after determining the message letter. The number of times is the number represented by the key letter. This is actually a modulo 26 process.
To expand, the above encryption can only encrypt 26 letters and is not case-sensitive. But in fact, in addition to letters, English also has punctuation marks and spaces. If most English characters are taken into account, the Vigenere substitution table will be relatively large and a bit of a waste of space. If it is assumed that there are N characters that can be encrypted, and if these N characters are built into a ring, then the encryption process is a process modulo N, that is, C(i)=(K(i) P(i))modN, where K, C, and P represent the key space, ciphertext space, and message (plaintext) space respectively.
Some people on the Internet have implemented this encryption algorithm in C, and almost all of them use the lookup and substitution table method. Although the substitution table can be generated programmatically, the generated substitution table is too regular. I implemented the following using Javascript, using the module method. It feels more flexible and definitely takes up less space (the time efficiency has not yet been estimated)

Copy code The code is as follows:

var Vigenere = {
_strCpr: 'abcdefghijklmnopqrstuvwxyz_12345 67890.ABCDEFGHIJKLMNOPQRSTUVWXYZ',//You can disrupt the order of this string or add more characters
_strKey: function(strK,str ){//Generate key string, strK is the key, str is the plaintext or ciphertext
var lenStrK = strK.length;
var lenStr = str.length;
if(lenStrK != lenStr ) {// If the key length is different from STR, you need to generate a key string. Key string
while(lenStrK < lenStr){
strK = strK strK;
lenStrK = 2 * lenStrK;
}
}//At this time, the length of the key string Greater than or equal to the length of str
                                                                                                                                                                  using         using         using       using   using   using     using     using   using   using   using   using using using using   through using using using out through out out through out out out out out out out through out out outallow out's ’ s ’ through ’ through ‐ to ‐ ‐ ‐ n r r‐ and 🎜>}

Vigenere.lenCpr = Vigenere._strCpr.length;

Vigenere.Encrypt = function(K,P){//Encryption algorithm, K is the key, P is the plaintext
K = Vigenere._strKey(K,P);

var lenK = K.length ;

var rlt = '';

var loop = 0;

for(loop=0; loop var iP = Vigenere._strCpr.indexOf(P.charAt( loop));
if(iP==-1) return 'This algorithm cannot currently encrypt the character: 'P.charAt(loop)';
var iK = Vigenere._strCpr.indexOf(K. charAt(loop));
if(iK==-1) return 'The key contains illegal characters:' K.charAt(loop);
var i = (iP iK) % Vigenere.lenCpr;
rlt = rlt Vigenere._strCpr.charAt(i);
}
return rlt;
};

Vigenere.DisEncrypt = function(K,C){
K = Vigenere._strKey(K,C);
var lenK = K.length;
var rlt = '';

var loop = 0;

for(loop=0; loop var iK = Vigenere._strCpr.indexOf(K.charAt(loop));
if(iK==- 1) return 'The key contains illegal characters:' K.charAt(loop); var iC = Vigenere._strCpr.indexOf(C.charAt(loop));
if(iK > iC){
rlt = Vigenere._strCpr.charAt(iC Vigenere.lenCpr - iK);
}
else{
rlt = Vigenere._strCpr.charAt(iC - iK);
}
}
return rlt;
};


Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to implement an online speech recognition system using WebSocket and JavaScript How to implement an online speech recognition system using WebSocket and JavaScript Dec 17, 2023 pm 02:54 PM

How to use WebSocket and JavaScript to implement an online speech recognition system Introduction: With the continuous development of technology, speech recognition technology has become an important part of the field of artificial intelligence. The online speech recognition system based on WebSocket and JavaScript has the characteristics of low latency, real-time and cross-platform, and has become a widely used solution. This article will introduce how to use WebSocket and JavaScript to implement an online speech recognition system.

WebSocket and JavaScript: key technologies for implementing real-time monitoring systems WebSocket and JavaScript: key technologies for implementing real-time monitoring systems Dec 17, 2023 pm 05:30 PM

WebSocket and JavaScript: Key technologies for realizing real-time monitoring systems Introduction: With the rapid development of Internet technology, real-time monitoring systems have been widely used in various fields. One of the key technologies to achieve real-time monitoring is the combination of WebSocket and JavaScript. This article will introduce the application of WebSocket and JavaScript in real-time monitoring systems, give code examples, and explain their implementation principles in detail. 1. WebSocket technology

How to implement an online reservation system using WebSocket and JavaScript How to implement an online reservation system using WebSocket and JavaScript Dec 17, 2023 am 09:39 AM

How to use WebSocket and JavaScript to implement an online reservation system. In today's digital era, more and more businesses and services need to provide online reservation functions. It is crucial to implement an efficient and real-time online reservation system. This article will introduce how to use WebSocket and JavaScript to implement an online reservation system, and provide specific code examples. 1. What is WebSocket? WebSocket is a full-duplex method on a single TCP connection.

How to use JavaScript and WebSocket to implement a real-time online ordering system How to use JavaScript and WebSocket to implement a real-time online ordering system Dec 17, 2023 pm 12:09 PM

Introduction to how to use JavaScript and WebSocket to implement a real-time online ordering system: With the popularity of the Internet and the advancement of technology, more and more restaurants have begun to provide online ordering services. In order to implement a real-time online ordering system, we can use JavaScript and WebSocket technology. WebSocket is a full-duplex communication protocol based on the TCP protocol, which can realize real-time two-way communication between the client and the server. In the real-time online ordering system, when the user selects dishes and places an order

JavaScript and WebSocket: Building an efficient real-time weather forecasting system JavaScript and WebSocket: Building an efficient real-time weather forecasting system Dec 17, 2023 pm 05:13 PM

JavaScript and WebSocket: Building an efficient real-time weather forecast system Introduction: Today, the accuracy of weather forecasts is of great significance to daily life and decision-making. As technology develops, we can provide more accurate and reliable weather forecasts by obtaining weather data in real time. In this article, we will learn how to use JavaScript and WebSocket technology to build an efficient real-time weather forecast system. This article will demonstrate the implementation process through specific code examples. We

Simple JavaScript Tutorial: How to Get HTTP Status Code Simple JavaScript Tutorial: How to Get HTTP Status Code Jan 05, 2024 pm 06:08 PM

JavaScript tutorial: How to get HTTP status code, specific code examples are required. Preface: In web development, data interaction with the server is often involved. When communicating with the server, we often need to obtain the returned HTTP status code to determine whether the operation is successful, and perform corresponding processing based on different status codes. This article will teach you how to use JavaScript to obtain HTTP status codes and provide some practical code examples. Using XMLHttpRequest

How to use insertBefore in javascript How to use insertBefore in javascript Nov 24, 2023 am 11:56 AM

Usage: In JavaScript, the insertBefore() method is used to insert a new node in the DOM tree. This method requires two parameters: the new node to be inserted and the reference node (that is, the node where the new node will be inserted).

How to get HTTP status code in JavaScript the easy way How to get HTTP status code in JavaScript the easy way Jan 05, 2024 pm 01:37 PM

Introduction to the method of obtaining HTTP status code in JavaScript: In front-end development, we often need to deal with the interaction with the back-end interface, and HTTP status code is a very important part of it. Understanding and obtaining HTTP status codes helps us better handle the data returned by the interface. This article will introduce how to use JavaScript to obtain HTTP status codes and provide specific code examples. 1. What is HTTP status code? HTTP status code means that when the browser initiates a request to the server, the service

See all articles