5.4 Permutation Functions

Slides:



Advertisements
Similar presentations
1.6 Functions. Chapter 1, section 6 Functions notation: f: A B x in A, y in B, f(x) = y. concepts: –domain of f, –codomain of f, –range of f, –f maps.
Advertisements

CAP Cryptographic Analysis Program
CAP Cryptographic Analysis Program
Chapter 4 Systems of Linear Equations; Matrices
Chapter 4 Systems of Linear Equations; Matrices
Transitive Closure Theorem 1. Let R be a relation on a set A. Then R  is the transitive closure of R. the reachability relation R * of a relation R on.
3.III. Matrix Operations 3.III.1. Sums and Scalar Products 3.III.2. Matrix Multiplication 3.III.3. Mechanics of Matrix Multiplication 3.III.4. Inverses.
1 Section 1.8 Functions. 2 Loose Definition Mapping of each element of one set onto some element of another set –each element of 1st set must map to something,
Section 4.1 Finite Permutation Groups Permutation of a Set Let A be the set { 1, 2, …, n }. A permutation on A is a function f : A  A that is both one-to-one.
Examining the top three rows first Row two requires a 5. It has to be located in the middle 3x3 box. Two possible locations for 5 in centre box The centre.
1 Codes, Ciphers, and Cryptography-Ch 3.1 Michael A. Karls Ball State University.
HAWKES LEARNING SYSTEMS math courseware specialists Copyright © 2011 Hawkes Learning Systems. All rights reserved. Hawkes Learning Systems College Algebra.
Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon.
Introduction to Cryptography
How to find the inverse of a matrix
Microsoft Excel Spreadsheet With Potential What is Excel Excel is Microsoft’s spreadsheet It is included within Microsoft office, along with Word, Power.
TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.
Gems of Algebra: The secret life of the symmetric group
CSCI 115 Chapter 5 Functions. CSCI 115 §5.1 Functions.
Permutations Linear and Circular. Essential Question: How do I solve problems using permutations?
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Matrices This chapter is not covered By the Textbook 1.
Introduction to Cryptography
1 Relations and Functions Chapter 5 1 to many 1 to 1 many to many.
6.3 Permutation groups and cyclic groups  Example: Consider the equilateral triangle with vertices 1 , 2 , and 3. Let l 1, l 2, and l 3 be the angle bisectors.
An ordered n-tuple is a set of n objects with an order associated with them. If n objects are represented by x 1, x 2,..., x n, then we write the ordered.
Chapter 9 Matrices and Determinants Copyright © 2014, 2010, 2007 Pearson Education, Inc Multiplicative Inverses of Matrices and Matrix Equations.
Unit 3: Matrices.
13.1 Matrices and Their Sums
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Permutation Groups Part 1. Definition A permutation of a set A is a function from A to A that is both one to one and onto.
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesFunctions.
Cryptography (Traditional Ciphers)
Security in Computing Cryptography (Traditional Ciphers)
Great Theoretical Ideas in Computer Science for Some.
Chapter 1 SETS, FUNCTIONs, ELEMENTARY LOGIC & BOOLEAN ALGEBRAs BY: MISS FARAH ADIBAH ADNAN IMK.
Section 2.3: Substitution Ciphers
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
Math 3121 Abstract Algebra I Lecture 7: Finish Section 7 Sections 8.
Learning Objectives for Section 4.5 Inverse of a Square Matrix
CS Lecture 14 Powerful Tools     !. Build your toolbox of abstract structures and concepts. Know the capacities and limits of each tool.
CSNB 143 Discrete Mathematical Structures
SECTION 9 Orbits, Cycles, and the Alternating Groups Given a set A, a relation in A is defined by : For a, b  A, let a  b if and only if b =  n (a)
Notes Over 4.4 Finding the Inverse of 2 x 2 Matrix.
Permutations Introduction – Lecture 2. Permutations As we know a permutation  is a bijective bijektivna mapping of a set A onto itself:  : A  A. Permutations.
Unit 3: Matrices. Matrix: A rectangular arrangement of data into rows and columns, identified by capital letters. Matrix Dimensions: Number of rows, m,
Dr. Saatchi, Seyed Mohsen 1 Arab Open University - AOU T209 Information and Communication Technologies: People and Interactions Sixth Session.
Mathematics Medicine What is meant by a matrix A matrix is a set of numbers arranged in the form of a rectangle and enclosed in curved brackets.
Chapter 4 Systems of Linear Equations; Matrices
Substitution Ciphers.
Relations, Functions, and Matrices
Unit-III Algebraic Structures
Unit 1: Matrices Day 1 Aug. 7th, 2012.
Groups and Applications
Great Theoretical Ideas In Computer Science
Columnar Transposition
(1)The equation ax=b has a unique solution in G.
Counting I: Bijection and Choice Trees
Advanced Combinations and Permutations
Learning Objectives for Section 4.5 Inverse of a Square Matrix
Permutations COURSE 2 LESSON 12-6
5.1 Functions.
Chapter 4 Systems of Linear Equations; Matrices
Theorem 6. 6: Let [G;] be a group and let a and b be elements of G
How to find the nth rule for a linear sequence
. Columnar Transposition
Who put the “Work” in Workbook
A step by step instruction guide
Chapter 4 Systems of Linear Equations; Matrices
Presentation transcript:

5.4 Permutation Functions

Bijections on a finite set A to itself is called a permutation of A A permutation is one to one and onto. -A function is one to one if a unique element of A is a function with a unique element of the second set of A -A function is onto if each element of A is a function with each element of the second set of A A = {1,2,3}, then all permutations of A with corresponding functions values are: 1A P1 P2 P3 P4 P5

The number of permutations of a set with 3 elements is 3! (3 factorial). 3! = 6 1A is the identity function P1 The finite set is on top row and the corresponding function values are on the lower row.

P4 = {(1,3), (2,1), (3,2)} The inverse of P4: P4-1 = {(3,1), (1,2), (2,3)} We put this in increasing order: P4-1 = {(1,2), (2,3), (3,1)} We see that P4-1 = P3

To find the composition: P3 P2 composition = Starting at the first column of the second permutation, 1 points to 2, go to the column labeled 2 of the first permutation. Under 2 is the number 3. Put 3 under the first column of the result permutation. Next, the second column of the second permutation 2 points to 1. Go to the column labeled 1 of the first permutation. Under 1 is the number 2. Put 2 under the second column of the result permutation. Next, the third column of the second permutation 3 points to 3. Go to the column labeled 3 of the first permutation. Under 3 is the number 1. Put 1 under the third column of the result permutation. 1 2 3

Cyclic permutations are cycles (not like the digraph cycles) Cyclic permutations are cycles (not like the digraph cycles). Cycles are not required to include all the numbers of a set. Cycle (3,2,1,4) could be a permutation of the set {1,2,3,4} or of {1,2,3,4,5,6,7,8} Cycle (3,5,8,2) = (5,8,2,3) = (8,2,3,5) = (2,3,5,8) 3 2 5 8

The composition of cycles (4,1,3,5) (5,6,3) Where A = {1,2,3,4,5,6} 4 R 1, 1R3, 3R5, 5R4 Cycle (5,6,3) 5R6, 6R3, 3R5 = 1 2 3 4 5 6

If we perform (5,6,3) (4,1,3,5) = We see that: (4,1,3,5) (5,6,3) = (5,6,3) (4,1,35)

Two cycles are said to be disjoint if there is no like element of A that appears in both cycles. Cycles (1,2,5) and (3,4,6) are disjoint. There are no like elements.

Permutations are used to produce transposition codes Permutations are used to produce transposition codes. A common transposition code is the keyword columnar transposition. In this code, a keyword is needed: Message: The fifth goblet contains the gold Keyword: JONES JONES THEFI FTHGO BLETC ONTAI NSTHE GOLDX The message is padded with an X to fill the row.

1. Assign a number to each letter of the keyword. 1 2 3 4 5 JONES 2 1. Assign a number to each letter of the keyword. 1 2 3 4 5 JONES 2. Write the cycle, placing the number in alphabetic order E J N O S (4,1,3,2,5) 3. Encoded message: FGTAHDTFBONGEHETTLHTLNSOIOCIEX Divide the number of letters 30 by 5, because JONES has 5 letters, to discover there are 6 rows. 30 letters divided by 5 = 6. Every 6th letter, put a hash mark to determine the letters for each column. Column 4 Column 1 Column 3 Column 2 Column5 FGTAHD | TFBONG | EHETTL | HTLNSO | IOCIEX

4. Write the letters, six at a time, starting in column 4, followed by the next set of six letters in column 2, followed by the next set of xix letter in column 3, and the next set of 6 letter ins column 2, and the final six letters in column 5. 1 2 3 4 5 JON E S THE F I FTH GO BLE T C ONT A I NST H E GOL DX

Test the waters 1 2 3 4 5 6 7 8 9 10 11 12 13 S T E E E A T H S T T W R The numbers refer to the position of the letters in a message. (1,2,3) (4,7) (5,10,11) (6,8,12,13,9) First we see we have 1,2,3,4,5,6,7,8,9,10,11,12,13 (our top numbers for our permutations) Next we see 1R2,2R3,3R1 4R7,7R4 5R10,10R11,11R5 6R8,8R12,12R13,13R9,9R6

(1,2,3) (4,7) Result = (5,10,11) (6,8,12,13,9)

We have (1,2), (2,3), (3,1), (4,7), (5,10),(6,8), (7,4), (8,12), (9,6), (10,11), (11,5), (12,13), (13,9) Inverse permutation (2,1),(3,2),(1,3),(7,4), (10,5), (8,6), (4,7),(12,8),(6,9), (11,10), (5,11), (13,13),(9,13)

(2,1),(3,2),(1,3),(7,4), (10,5), (8,6), (4,7),(12,8),(6,9), (11,10), (5,11), (13,13),(9,13) 1 2 3 4 5 6 7 8 9 10 11 12 13 S T E E E A T H S T T W R T E S T T H E W A T E R S 1 2 3 4 5 6 7 8 9 10 11 12 13 (2,1) The second letter goes to position 1 (3,2) The 3rd letter goes to position 2 (1,3) The 1st letter goes to position 3 (7,4) The 7th letter goes to position 4 (10,5) The 10th letter goes to position 5 (8,6) The 8th letter goes to position 6 (4,7) The 4th letter goes to position 7 (12,8) The 12th letter goes to position 8 (6,9) The 6th letter goes to position 9 (11,10) The 11th letter goes to position 10 (5,11) The 5th letter goes to position 11 (13,12) The 13th letter goes to position 12 (9,13) The 9th letter goes to position 13