This is an encryption operating on groups of 5-bit words, by means of coordinate-wise addition modulo 2 (see modular arithmetic). Normally, the CCIT2-code is used. The key should be a completely random, one-time key (see key).
The Vernam table for Z32 = Z2 5 (Gilbert S. Vernam, 1917) looks like:
0 |
a |
b |
c |
d |
e |
f |
g |
h |
i |
j |
k |
l |
m |
n |
o |
p |
q |
r |
s |
t |
u |
v |
w |
x |
y |
z |
2 |
3 |
4 |
5 |
1 |
|
0 |
0 |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
2 |
3 |
4 |
5 |
1 |
A |
A |
0 |
G |
F |
R |
5 |
C |
B |
Q |
S |
4 |
N |
Z |
1 |
K |
3 |
Y |
H |
D |
I |
W |
2 |
X |
T |
V |
P |
L |
U |
O |
J |
E |
M |
B |
B |
G |
0 |
Q |
T |
O |
H |
A |
F |
1 |
L |
P |
J |
S |
Y |
E |
K |
C |
W |
M |
D |
V |
U |
R |
2 |
N |
4 |
X |
5 |
Z |
3 |
I |
C |
C |
F |
Q |
o |
U |
K |
A |
H |
G |
4 |
S |
E |
M |
L |
5 |
P |
O |
B |
2 |
J |
V |
D |
T |
X |
W |
3 |
1 |
R |
Y |
I |
N |
Z |
D |
D |
R |
T |
U |
0 |
4 |
2 |
W |
X |
K |
5 |
I |
3 |
Y |
S |
Z |
1 |
V |
A |
N |
B |
C |
Q |
G |
H |
M |
O |
F |
L |
E |
J |
P |
E |
E |
5 |
O |
K |
4 |
0 |
N |
3 |
Y |
U |
R |
C |
W |
X |
F |
B |
Q |
P |
J |
2 |
Z |
I |
1 |
L |
M |
H |
T |
S |
G |
D |
A |
V |
F |
F |
C |
H |
A |
2 |
N |
0 |
Q |
B |
J |
I |
5 |
1 |
Z |
E |
Y |
3 |
G |
U |
4 |
X |
R |
W |
V |
T |
O |
M |
D |
P |
S |
K |
L |
G |
G |
B |
A |
H |
W |
3 |
Q |
0 |
C |
M |
Z |
Y |
4 |
I |
P |
5 |
N |
F |
T |
1 |
R |
X |
2 |
D |
U |
K |
J |
V |
E |
L |
O |
S |
H |
H |
Q |
F |
G |
X |
Y |
B |
C |
0 |
L |
1 |
3 |
I |
4 |
O |
N |
5 |
A |
V |
Z |
2 |
W |
R |
U |
D |
E |
S |
T |
K |
M |
P |
J |
I |
I |
S |
1 |
4 |
K |
U |
J |
M |
L |
0 |
F |
D |
H |
G |
R |
V |
T |
Z |
N |
A |
P |
E |
This is a preview of subscription content, log in via an institution.
References
Bauer, F.L. (1997). “Decrypted secrets.” Methods and Maxims of Cryptology. Springer-Verlag, Berlin.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Bauer, F.L. (2005). Vernam Cipher. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_453
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_453
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering