Presentation is loading. Please wait.

Presentation is loading. Please wait.

Permutations and Ciphers

Similar presentations


Presentation on theme: "Permutations and Ciphers"— Presentation transcript:

1 Permutations and Ciphers
By: Hani, Joe Gamble, Russel, and Andrew

2 Permutations Both parties agree on an order with serves as the key.
Ex:635241 The key is used to encode n-letter blocks where n is the length of the key. Using the above example n=6 The receiver reverses the encode to decrypt the message.

3 Examples Key: Plain text: 1 2 3 4 5 6 7 8 9 10
Ciphertext: 2 4  6    3  5  7  9 Encryption: CRYPTOLOGY RPOOYCYTLG Decryption: SICASCC  LS CSCI CLASS

4 Examples (cont.) key: x 1 2 3 4 5 6 7 8 9 10 p(x) 8 5 9 6 1 10 3 7 2 4
Plain: abcdefghij klmnopqrst uvwxyzzzzz (extra z's used as padding) Cipher: heifajcgbd rospktmqln zyzzuzwzvx Plain: its bad luck to be superstitious Plain: itsbadluck tobesupers titiouszzz  (extra z's used as padding) Cipher: uacdiksltb esrutsbpoe zozutztsii


Download ppt "Permutations and Ciphers"

Similar presentations


Ads by Google