Search for a tool
VIC Cipher

Tool to decrypt / encrypt with Vic. The Vic cipher (named after a Soviet spy named Victor) is a figure attached to the Nihilists, combining several cryptographic techniques.

Results

VIC Cipher -

Tag(s) : Poly-Alphabetic Cipher, Substitution Cipher

Share
Share
dCode and you

dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!


Team dCode likes feedback and relevant comments; to get an answer give an email (not published). It is thanks to you that dCode has the best VIC Cipher tool. Thank you.

VIC Cipher

VIC Cipher Decoder



Straddling Checkerboard




Parameters



See also: Nihilist Cipher

Vic Cipher Encoder



Straddling Checkerboard




Parameters





See also: Nihilist Cipher

Tool to decrypt / encrypt with Vic. The Vic cipher (named after a Soviet spy named Victor) is a figure attached to the Nihilists, combining several cryptographic techniques.

Answers to Questions

How to encrypt using Vic cipher?

Vic encryption starts with the creation of a grid called 'Straddling Checkerboard' generated from a deranged alphabet (see below on how to create it)

Example: The following grid (with the numbers 2 and 6 and an upside-down deranged alphabet complemented by . and /)

\0123456789
./ ZYX WVU
2TSRQPONMLK
6JIHGFEDCBA

Each character is then associated with its coordinates (line, column), so the plain message can then be coded numerically by following these associations.

Example: The text VICTOR is coded 8,61,67,20,25,22 or 86167202522 (by concatenation)

The Vic cipher may end there, but an over-encryption is possible by using a numeric key that will be added, digit after digit, modulo 10.

Example: The key 0248 is used, the over-encrypted code becomes 88547240546 via the calculation:

Cipher message86167202522
Key (repeated)02480248024
Addition (mod 10)88547440546

A final step, optional, is to convert the numbers obtained into letters, via the checkerboard / grid.

If the last digit corresponds to a line identifier of the grid, then add another digit randomly to make this last step possible. The consequence is that the decoded message will have a superfluous extra letter.

Example: 8 => V, 5 => X, etc. (the last digit 6 does not exist, but, for example, 60 exists) to get the final message VVXYWYY.XYJ

How to decrypt Vic cipher?

The Vic decryption requires to know the grid (or checkerboard) used during the encryption.

Example:

\0123456789
P IA BCDEF
1GHJKLMNOQR
4STUVWXYZ./

The encrypted message may be in numeric or alphabetic form (depending on the optional steps selected during encryption).

If the message is alphabetic, then convert it to numeric via the grid (row, column coordinates) otherwise skip this step

Example: The message DMPBDBFEU is then translated to 71505759842

If the encryption used a numeric key, then subtract it digit after digit, via a subtraction modulo 10.

Example: The key 314 was used, the result of the subtraction is then 40247328417 via the calculation:

Cipher message71505759848
Key (repeated)31431431431
Subtraction (mod 10)40174328417

Transcribe the numeric code into letters via the grid using the coordinates (line, column) to get the plain message.

Example: 40 => S, 17 => O, 43 => V, 2 => I, 8 => E, 41 => T, 7 => D soit SOVIET (+D, the last letter is a residue)

How to generate the Vic grid/checkerboard?

The grid / checkerboard contains an alphabet of 28 characters over 3 rows and 10 columns marked with numerical coordinates. By default, the 28 characters are ABCDEFGHIJKLMNOPQRSTUVWXYZ and the characters . (dot) and / (slash) in a random or predefined order (refer to the generation of deranged alphabets). The column coordinates ranges from 0 to 9 (0, 1, 2, 3, 4, 5, 6, 7, 8, 9) and the coordinates of the rows ranges from 0 to 2 (0, 1, 2), but it is common not to display the 0 and to use 2 others numbers instead of 1 and 2 to make encryption more complex. The grid is filled with the 28 characters, that is 1 character per box except for the coordinates 0,1 and 0,2 (where '0, x' are the figures chosen previously for the line numbers).

Example: The alphabet AZERTYUIOPQSDFGHJKLMWXCVBN./ combined with the numbers 3 and 7 make it possible to create the grid

\0123456789
AZE RTY UI
3OPQSDFGHJK
7LMWXCVBN./

This grid makes it possible to generate associations between numbers (coordinate line, column) and characters, these associations are used for the encryption and the decryption.

Example: Z is associated with 1 (the characters of the first line are associated with a number), B is associated with 76 (the characters of the other lines have 2 digits)

How to recognize a Vic ciphertext?

A message encrypted by Vic is either numeric or alphabetic (+ the two characters . and /).

If the message is numeric and without key, it contains 2 digits that have a higher occurrence frequency than the others (the 2 digits of the grid).

If the message is alphabetical, it contains 8 characters with a frequency higher than the others (those of the first line of the grid).

The story of this cipher is in part linked to a microfilm found in a coin by a Brooklyn newspapers' boy who had never been deciphered until a Russian spy, named Reino Häyhänen, described its encryption system to the FBI. Any reference to a microfilm, New York or a newspaper delivery man is a clue.

How to decipher Vic without grid?

The knowledge of the grid is almost indispensable, the number of grid possibilities is of the order of 10^30. Brute force attack is therefore deprecated, unless the grid is generated from a single common keyword.

How to decipher Vic without key?

The key can be bruteforced if it is short, the number of attempt is 10^(key size).

What are the variants of the Vic cipher?

The Vic cipher has several optional steps, depending on their application, the results may be different.

The Vic cipher being of Russian origin, it is often associated with the nihilist cipher of which it is itself considered as a variant.

When Vic have been invented ?

Vic use was established in the 1950s, its first traces date back to 1953 where US intelligence associated it with the Russian spy Reino Häyhänen, known as Victor.

Source code

dCode retains ownership of the source code of the script VIC Cipher online. Except explicit open source licence (indicated Creative Commons / free), any algorithm, applet, snippet, software (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, translator), or any function (convert, solve, decrypt, encrypt, decipher, cipher, decode, code, translate) written in any informatic langauge (PHP, Java, C#, Python, Javascript, Matlab, etc.) which dCode owns rights will not be released for free. To download the online VIC Cipher script for offline use on PC, iPhone or Android, ask for price quote on contact page !

Questions / Comments

Team dCode likes feedback and relevant comments; to get an answer give an email (not published). It is thanks to you that dCode has the best VIC Cipher tool. Thank you.


Source : https://www.dcode.fr/vic-cipher
© 2019 dCode — The ultimate 'toolkit' to solve every games / riddles / geocaches. dCode
Feedback