Download presentation
Presentation is loading. Please wait.
1
Permutations and Ciphers
By: Hani, Joe Gamble, Russel, and Andrew
2
Permutations Both parties agree on an order with serves as the key.
Ex:635241 The key is used to encode n-letter blocks where n is the length of the key. Using the above example n=6 The receiver reverses the encode to decrypt the message.
3
Examples Key: Plain text: 1 2 3 4 5 6 7 8 9 10
Ciphertext: 2 4 6 3 5 7 9 Encryption: CRYPTOLOGY RPOOYCYTLG Decryption: SICASCC LS CSCI CLASS
4
Examples (cont.) key: x 1 2 3 4 5 6 7 8 9 10 p(x) 8 5 9 6 1 10 3 7 2 4
Plain: abcdefghij klmnopqrst uvwxyzzzzz (extra z's used as padding) Cipher: heifajcgbd rospktmqln zyzzuzwzvx Plain: its bad luck to be superstitious Plain: itsbadluck tobesupers titiouszzz (extra z's used as padding) Cipher: uacdiksltb esrutsbpoe zozutztsii
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.