Source Codes > Network Security Algorithms > Vernum Cipher
class VernumCipher
{
public static String encrypt(String data,String key)
{
String alp="abcdefghijklmnopqrstuvwxyz ";
String output="";
for(int i=0;i<data.length();i++)
{
int index;
int index1=alp.indexOf(data.charAt(i));
int index2=alp.indexOf(key.charAt(i));
if(index1==26 || index2==26)
index=26;
else
index=(index1+index2);
if(index>26)
index-=26;
output+=alp.charAt(index);
}
return output;
}
public static void main(String args[])
{
try{
System.out.println("plain text: "+args[0]);
System.out.println("key used: "+args[1]);
System.out.println("cipher text:"+encrypt(args[0],args[1]));
}
catch(Exception e)
{
System.out.println(e);
}
}
}
{
public static String encrypt(String data,String key)
{
String alp="abcdefghijklmnopqrstuvwxyz ";
String output="";
for(int i=0;i<data.length();i++)
{
int index;
int index1=alp.indexOf(data.charAt(i));
int index2=alp.indexOf(key.charAt(i));
if(index1==26 || index2==26)
index=26;
else
index=(index1+index2);
if(index>26)
index-=26;
output+=alp.charAt(index);
}
return output;
}
public static void main(String args[])
{
try{
System.out.println("plain text: "+args[0]);
System.out.println("key used: "+args[1]);
System.out.println("cipher text:"+encrypt(args[0],args[1]));
}
catch(Exception e)
{
System.out.println(e);
}
}
}