writeGoMenuHeader('http://site.answers.com/main11569','lookupMenuHeader','lookup1',!false,'http://images.google.com/images?ie=UTF-8&q=','http://news.google.com/news?hl=en&edition=us&ie=UTF-8&oe=UTF-8&q=','http://www.icerocket.com/search?tab=blog&ref=answers&q=','Search Answers.com','go_buttonUp.gif','go_buttonDown.gif','Click here for more Options','News','26px');AnswersWebShoppingImagesNewsBlogs
Wikipedia --------------- Or search: - The Web - Images - News - Blogs - Shopping
Wikipedia
Library > Reference > Wikipedia
permutation cipher
In classical cryptography, a permutation cipher is a transposition cipher in which the key is a permutation. To apply a cipher, a random permutation of size e is generated (the larger the value of e the more secure the cipher). The plaintext is then broken into segments of size e and the letters within that segment are permuted according to this key. In theory, any transposition cipher can be viewed as a permutation cipher where e is equal to the length of the plaintext; this is too cumbersome a generalisation to use in actual practice, however.
Identifying the cipher Because the cipher doesn't change any of the characters, the ciphertext will have exactly the same letter frequencies as the underlying plaintext. This means that the cipher can in many cases be identified as a transposition by the close similarity of its letter statistics with the letter frequencies of the underlying language.
Breaking the cipher Because the cipher operates on blocks of size e, the plaintext and the ciphertext have to have a length which is some multiple of e. This causes two weakness in the system: firstly, that the plaintext may have to be padded (if the padding is identifiable then part of the key is revealed) and secondly, information relating to the length of the key is revealed by the length of the ciphertext. To see this, note that if the ciphertext is of length i then e must be one of the divisors of i. With the different possible key sizes different possible permutations are tried to find the permutation which results in the highest number of frequent bigrams and trigrams as found in the underlying language of the plaintext. Trying to find this permutation is essentially the same problem encountered when analysing a columnar transposition cipher: multiple anagramming.
This entry is from Wikipedia, the leading user-contributed encyclopedia. It may not have been reviewed by professional editors (see full disclaimer)
Donate to Wikimedia
if (document.getElementById('nistar'))document.getElementById('nistar').disabled=true;
Copyrights:
Wikipedia information about permutation cipherThis article is licensed under the GNU Free Documentation License. It uses material from the Wikipedia article "Permutation cipher". More from Wikipedia
On this page: Select Article Wikipedia --------------- Or search: - The Web - Images - News - Blogs - Shopping
document.write('E-mail');E-mailE-mail Print Link
document.write('')
ShoppingBUSlink Cipher Shield 80 GB USB 2.0 Hard Drive Universal BUSlink 750GB CIPHER SHIELD KEY ENCRYPTED 128 BIT EXT HARD DRIVEShopEnter a keyword ( browse ) Choose a categoryAll CategoriesBooksCarsClothing & AccessoriesComputers & SoftwareElectronicsFlower & GiftsHealth & BeautyHome & GardenJewelry & WatchesKids & FamilyMoviesMusicOfficeSports & OutdoorsVideo GamesMatching CategoriesHard Drives (1)Books (81)Tools and Hardware (32)Clothing (21)Sport and Outdoor (13)Shoes (9)Best Matches
Mentioned Inpermutation cipher is mentioned in these AnswerPages:Hasty Pudding Ciphertransposition cipherTopics in cryptographyList of mathematics articles (P)block cipherMore>
document.write('')
About "permutation cipher":Find the permutation for the following ciphertext encrypted with a permutation cipher: BTOOLLYDWGHOEENRAONMSHGAEOBNOERFTERM THIS QUESTION COULD BE BASED ON PERMUTATION OR COMBINATION. Suppose you knew a message had been coded using a Substitution cipher. If it took you one second to... I am attempting to solve a numeric cipher/code in which the letter should translate or arrange into words.
var akApiKey = 'RecEngine-7A83B8E9-930D-1984-EA88-6EFED32BFCEE'; var akTargetType = 'MEDIA'; var akKeywords='reference reference'; var akTargetDesc = 'permutation cipher';
var akScript = document.createElement('script'); akScript.setAttribute('src', 'http://api.aggregateknowledge.com/2007/01/15/js/' + (new Date()).valueOf() % 3600000 + '.js'); document.getElementsByTagName('head')[0].appendChild(akScript);
writeGoMenuFooter('http://site.answers.com/main11569','lookupMenuFooter','lookup2',!false,'http://images.google.com/images?ie=UTF-8&q=','http://news.google.com/news?hl=en&edition=us&ie=UTF-8&oe=UTF-8&q=','http://www.icerocket.com/search?tab=blog&ref=answers&q=','Search Answers.com','go_buttonUp.gif','go_buttonDown.gif','Click here for more Options','News'); AnswersWebShoppingImagesNewsBlogs