Permutations and Ciphers By: Hani, Joe Gamble, Russel, and Andrew
Permutations Both parties agree on an order with serves as the key. Ex:635241 The key is used to encode n-letter blocks where n is the length of the key. Using the above example n=6 The receiver reverses the encode to decrypt the message.
Examples Key: Plain text: 1 2 3 4 5 6 7 8 9 10 Ciphertext: 2 4 6 8 10 1 3 5 7 9 Encryption: CRYPTOLOGY RPOOYCYTLG Decryption: SICASCC LS CSCI CLASS
Examples (cont.) key: x 1 2 3 4 5 6 7 8 9 10 p(x) 8 5 9 6 1 10 3 7 2 4 Plain: abcdefghij klmnopqrst uvwxyzzzzz (extra z's used as padding) Cipher: heifajcgbd rospktmqln zyzzuzwzvx Plain: its bad luck to be superstitious Plain: itsbadluck tobesupers titiouszzz (extra z's used as padding) Cipher: uacdiksltb esrutsbpoe zozutztsii