This is a tool that uses a combination between a brute force and dictionary attack on a Vigenere cipher.

At present, keys are generated using brute force (will soon try passwords generated from a dictionary first).
Each key is then used to decode the encoded message input. The output is analysed and then put into a ranking table. Outputs will be ranked on a variety of factors (at present, only number of dictionary words in output are counted).

For the future:
Better key generation, trying combinations of dictionary words with numbers. If that fails, brute force will be used.
For all attempts of the dictionary attack, only keys within the known key length range will be generated.
Better ranking system and analysis of possible decoded messages.

Note:
The version currently released, I made in an evening! It is nowhere near ready for release but is a fun project to think about and I need more ideas for improvements mentioned above.

Discuss possible solutions and ideas!

Project Activity

See All Activity >

License

Creative Commons Attribution License

Follow Vigenere Dictionary Attack

Vigenere Dictionary Attack Web Site

Other Useful Business Software
MongoDB Atlas runs apps anywhere Icon
MongoDB Atlas runs apps anywhere

Deploy in 115+ regions with the modern database for every enterprise.

MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Vigenere Dictionary Attack!

Additional Project Details

Operating Systems

Windows

Intended Audience

Developers, Security Professionals

User Interface

Command-line

Programming Language

Visual Basic .NET

Related Categories

Visual Basic .NET Cryptography Software, Visual Basic .NET Algorithms, Visual Basic .NET Brute Force Tool

Registered

2013-06-11