Hall III · Renaissance — 19th Century · 1553 – 1880

The Polyalphabetic Revolution

"Le chiffre indéchiffrable" — The unbreakable cipher. Until it wasn't.

The solution to frequency analysis seemed elegant: use multiple substitution alphabets, switching between them according to a keyword. The same plaintext letter encrypts differently each time. Frequency peaks vanish. For 300 years — from 1553 to 1863 — cryptographers believed this made the Vigenère cipher unbreakable. Charles Babbage proved them wrong. This hall tells the story of the longest-standing myth in cryptographic history.

Renaissance 19th Century Running Key: Hard to Break
🔑

The key insight of polyalphabetic ciphers: Instead of one fixed substitution alphabet, use a different alphabet for each letter position — determined by a keyword. The same plaintext letter E might encrypt as L in position 1, X in position 2, F in position 3. This defeats simple frequency analysis. But if the keyword repeats, the cipher repeats — and repetition is always the enemy of secrecy.

The Fatal Flaw

How the Repeating Key Betrays Itself

🔍The Kasiski Examination

When the same plaintext aligns with the same key letter, it produces the same ciphertext. Search the ciphertext for repeated 3+ letter sequences. The distances between them are multiples of the key length.

Ciphertext:
LXFOPVEFRNHRLXFOPVEFRNHR
      ↑               ↑
   pos 5           pos 18
   Distance = 13 → key length divides 13
📐Index of Coincidence

William Friedman's 1920 method works even without visible repetitions. Random text: IC ≈ 0.038. Natural English: IC ≈ 0.066. A Vigenère cipher falls between. The IC value narrows down the key length — split the ciphertext into columns matching the guessed key length, then apply frequency analysis to each column.

Text TypeIC Value
Random~0.038
Vigenère (key=5)~0.052
English~0.066
🌊Vigenère → Stream Ciphers

Vigenère uses a repeating key stream. Modern stream ciphers like ChaCha20 generate a non-repeating, cryptographically random keystream of the same length as the message — the same XOR operation, with an unguessable key.

📚Running Key → One-Time Pad

The running key cipher is one step from the one-time pad. The difference: a book passage is not random. If the source text has linguistic structure, that structure leaks into the ciphertext and enables statistical attacks.

🔑Key Length = Security

The Vigenère lesson: short repeating keys are fatal. Modern cryptography uses 128–256 bit keys that never repeat within a session, and key derivation functions ensure no two sessions share key material.

← Previous Hall Hall II: Classical Substitution