Research Article

Two-Key Dependent Permutation for Use in Symmetric Cryptographic System

Figure 1

Permutations graph for various values of and .