Tool to decrypt / encrypt with Vic. The Vic cipher (named after a Soviet spy named Victor) is a figure attached to the Nihilists, combining several cryptographic techniques.
VIC Cipher - dCode
Tag(s) : Poly-Alphabetic Cipher, Substitution Cipher
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
Vic encryption starts with the creation of a grid called Straddling Checkerboard generated from a deranged alphabet (see below on how to create it)
Example: The following grid (with the numbers 2 and 6 and an upside-down deranged alphabet complemented by . and /)
Each character is then associated with its coordinates (line, column), so the plain message can then be coded numerically by following these associations.
Example: The text VICTOR is coded 8,61,67,20,25,22 or 86167202522 (by concatenation)
The Vic cipher may end there, but an over-encryption is possible by using a numeric key that will be added, digit after digit, modulo 10.
Example: The key 0248 is used, the over-encrypted code becomes 88547240546 via the calculation:
|Addition (mod 10)||8||8||5||4||7||4||4||0||5||4||6|
A final step, optional, is to convert the numbers obtained into letters, via the checkerboard / grid.
If the last digit corresponds to a line identifier of the grid, then add another digit randomly to make this last step possible. The consequence is that the decoded message will have a superfluous extra letter.
Example: 8 => V, 5 => X, etc. (the last digit 6 does not exist, but, for example, 60 exists) to get the final message VVXYWYY.XYJ
The Vic decryption requires to know the grid (or checkerboard) used during the encryption.
The encrypted message may be in numeric or alphabetic form (depending on the optional steps selected during encryption).
If the message is alphabetic, then convert it to numeric via the grid (row, column coordinates) otherwise skip this step
Example: The message DMPBDBFEU is then translated to 71505759842
Example: The key 314 was used, the result of the subtraction is then 40247328417 via the calculation:
|Subtraction (mod 10)||4||0||1||7||4||3||2||8||4||1||7|
Transcribe the numeric code into letters via the grid using the coordinates (line, column) to get the plain message.
Example: 40 => S, 17 => O, 43 => V, 2 => I, 8 => E, 41 => T, 7 => D soit SOVIET (+D, the last letter is a residue)
The grid / checkerboard contains an alphabet of 28 characters over 3 rows and 10 columns marked with numerical coordinates. By default, the 28 characters are ABCDEFGHIJKLMNOPQRSTUVWXYZ and the characters . (dot) and / (slash) in a random or predefined order (refer to the generation of deranged alphabets). The column coordinates ranges from 0 to 9 (0, 1, 2, 3, 4, 5, 6, 7, 8, 9) and the coordinates of the rows ranges from 0 to 2 (0, 1, 2), but it is common not to display the 0 and to use 2 others numbers instead of 1 and 2 to make encryption more complex. The grid is filled with the 28 characters, that is 1 character per box except for the coordinates 0,1 and 0,2 (where '0, x' are the figures chosen previously for the line numbers).
Example: The alphabet AZERTYUIOPQSDFGHJKLMWXCVBN./ combined with the numbers 3 and 7 make it possible to create the grid
This grid makes it possible to generate associations between numbers (coordinate line, column) and characters, these associations are used for the encryption and the decryption.
Example: Z is associated with 1 (the characters of the first line are associated with a number), B is associated with 76 (the characters of the other lines have 2 digits)
A message encrypted by Vic is either numeric or alphabetic (+ the two characters . and /).
If the message is numeric and without key, it contains 2 digits that have a higher occurrence frequency than the others (the 2 digits of the grid).
If the message is alphabetical, it contains 8 characters with a frequency higher than the others (those of the first line of the grid).
The story of this cipher is in part linked to a microfilm found in a coin by a Brooklyn newspapers' boy who had never been deciphered until a Russian spy, named Reino Häyhänen, described its encryption system to the FBI. Any reference to a microfilm, New York or a newspaper delivery man is a clue.
The knowledge of the grid is almost indispensable, the number of grid possibilities is of the order of 10^30. Brute force attack is therefore deprecated, unless the grid is generated from a single common keyword.
The key can be bruteforced if it is short, the number of attempt is 10^(key size).
The Vic cipher has several optional steps, depending on their application, the results may be different.
The Vic cipher being of Russian origin, it is often associated with the nihilist cipher of which it is itself considered as a variant.
Vic use was established in the 1950s, its first traces date back to 1953 where US intelligence associated it with the Russian spy Reino Häyhänen, known as Victor.
Reminder : dCode is free to use.
The copy-paste of the page "VIC Cipher" or any of its results, is allowed as long as you cite dCode!
Cite as source (bibliography):
VIC Cipher on dCode.fr [online website], retrieved on 2022-08-08,