Permutation cipher









Permutation cipher - Wikipedia, the free encyclopedia

/**/








/**/



/**/








Your continued donations keep Wikipedia running!    

Permutation cipher

From Wikipedia, the free encyclopedia

Jump to: navigation, search
In classical cryptography, a permutation cipher is a transposition cipher in which the key is a permutation.
To apply a cipher, a random permutation of size e is generated (the larger the value of e the more secure the cipher). The plaintext is then broken into segments of size e and the letters within that segment are permuted according to this key.
In theory, any transposition cipher can be viewed as a permutation cipher where e is equal to the length of the plaintext; this is too cumbersome a generalisation to use in actual practice, however.

[edit] Identifying the cipher
Because the cipher doesn't change any of the characters, the ciphertext
will have exactly the same letter frequencies as the underlying
plaintext. This means that the cipher can in many cases be identified
as a transposition by the close similarity of its letter statistics
with the letter frequencies of the underlying language.

[edit] Breaking the cipher
Because the cipher operates on blocks of size e, the plaintext and the ciphertext have to have a length which is some multiple of e.
This causes two weakness in the system: firstly, that the plaintext may
have to be padded (if the padding is identifiable then part of the key
is revealed) and secondly, information relating to the length of the
key is revealed by the length of the ciphertext. To see this, note that
if the ciphertext is of length i then e must be one of the divisors of i.
With the different possible key sizes different possible permutations
are tried to find the permutation which results in the highest number
of frequent bigrams and trigrams as found in the underlying language of
the plaintext. Trying to find this permutation is essentially the same
problem encountered when analysing a columnar transposition cipher: multiple anagramming.

[edit] See also

Topics in cryptography




Classical cryptography
v â€Ã³ d â€Ã³ e




Ciphers: ADFGVX | Affine | Alberti | Atbash | Autokey | Bifid | Book | Caesar | Four-square | Hill | Keyword | Nihilist | Permutation | Pigpen | Playfair | Polyalphabetic | Polybius | Rail Fence | Reihenschieber | Reservehandverfahren | ROT13 | Running key | Scytale | Smithy code | Solitaire | Straddling checkerboard | Substitution | Tap Code | Transposition | Trifid | Two-square | VIC cipher | Vigenère


Cryptanalysis: Frequency analysis | Index of coincidence


Misc: Cryptogram | Bacon | Polybius square | Scytale | Straddling checkerboard | Tabula recta



Cryptography
v â€Ã³ d â€Ã³ e




History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography


Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers







Retrieved from "http://en.wikipedia.org/wiki/Permutation_cipher"
Categories: Classical ciphers | Permutations






Views


Article
Discussion
Edit this page
History




Personal tools


Sign in / create account






if (window.isMSIE55) fixalpha();

Navigation


Main page
Community portal
Featured content
Current events
Recent changes
Random article
About Wikipedia
Contact us
Make a donation
Help




Search



 





Toolbox


What links here
Related changes
Upload file
Special pages
Printable version Permanent linkCite this article



In other languages


Esperanto
Magyar
Esperanto
Magyar









This page was last modified 03:36, 11 March 2007.
All text is available under the terms of the GNU Free Documentation License. (See Copyrights for details.) Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a US-registered 501(c)(3) tax-deductible nonprofit charity.
Privacy policy
About Wikipedia
Disclaimers




if (window.runOnloadHook) runOnloadHook();



Wyszukiwarka

Podobne podstrony:
permutation cipher
CipherInputStream
PS6 cipher zad1
02 permutacje www
CipherInputStream
CipherOutputStream
Cipher
Instr obslugi CipherLab 1x60 v02 050905
CipherSpi
cipher2 g3o3hqf327fei6lnkf5s5xqkttab4qh5o5cno2i
next permutation
26 strings and ciphers
Permutation
function mcrypt get cipher name
function mcrypt get cipher name
KASUMI Block Cipher Cryptanalysis

więcej podobnych podstron