Lab 2
Lab 2
OVERVIEW
2.1.1 Introduction
2.1.2 Objective
- This course provides students with knowledge of cryptographic algorithms and how they
are used in today's world.
- The content emphasizes the principles, topics, approaches, and problem solving related to
the underlying technologies and architectures of the field.
CONTENTS
2.2.1 Summary
The Vigenere cipher is also known as multiple encodings. This is acodeation of this code
is the use of 26 other code table. Do that not beat in a long time. This code out but support
for use from the key is same benefit.
Algorithm:
Write a program to encrypt and decrypt text with Vigenere encryption algorithm. The
program can perform the following functions:
− Allow text input into the system.
− Allows entering text protection keys.
− Allows to write File and open File.
Guide:
❖ Step 1: Create New Project -> Lab2
Result:
Algorithm:
− Messages are written from left to right on the rails of an imaginary row diagonally
from top to bottom.
− Diagonally from the bottom up when reaching the lowest column.
− And when you reach the top of the column, rewrite diagonally from top to bottom.
Keep repeating like this until you write all the content of the message.
Example: Plain text: Nice to meet you
Key: 2
nctmeyu
ieoeto
Cipher text: nctmeyuIeoeto
Write a program to encrypt and decrypt text with Vigenere encryption algorithm. The
program can perform the following functions:
− Allow text input into the system.
− Allows entering text protection keys.
− Allows to write File and open File.
Guide:
❖ Step 1:Create Form: Rail_Fence
Result: