Research Article

Two-Key Dependent Permutation for Use in Symmetric Cryptographic System

Table 18

Texts with single bit change in the plain text: abcdefgh and corresponding permuted texts.

Bit positionText
(after a single bit change)
Permuted textBit positionText
(after a single bit change)
Permuted text

1ábcdefgh52d2ced2e8925c8333abcdåfgh52f2ced2e8925c82
2!bcdefgh52d2ced2e8925c0234abcd%fgh12d2ced2e8925c82
3abcdefgh52d0ced2e8925c8235abcdefgh52d2ced2e0925c82
4qbcdefgh52d2ced6e8925c8236abcdufgh52d2ced2e89a5c82
5ibcdefgh52d2cfd2e8925c8237abcdmfgh52d2ced2e8927c82
6ebcdefgh52d2ced2e8925c9238abcdafgh5292ced2e8925c82
7cbcdefgh52d2ded2e8925c8239abcdgfgh52d2ced2e8925ca2
8‘bcdefgh52d2ced2e892548240abcddfgh52d2cad2e8925c82
9aâcdefgh52d2cef2e8925c8241abcdeægh52d2ced2e8935c82
10a”cdefgh52d2ced2e8924c8242abcde&gh5252ced2e8925c82
11abcdefgh52d2ced2e8825c8243abcdefgh52d2ced0e8925c82
12arcdefgh52d6ced2e8925c8244abcdevgh52d2ced2e8925c8a
13ajcdefgh72d2ced2e8925c8245abcdengh53d2ced2e8925c82
14afcdefgh52d2ced2e8925cc246abcdebgh52d24ed2e8925c82
15a‘cdefgh42d2ced2e8925c8247abcdedgh50d2ced2e8925c82
16accdefgh52d2ced2e8d25c8248abcdeggh5ad2ced2e8925c82
17abãdefgh52d2ced3e8925c8249abcdefçh52d2ced2e8b25c82
18ab#defgh52d2ced2e8921c8250abcdef’h52d2ce52e8925c82
19abcdefgh52d2ced2e8905c8251abcdefgh52d2cec2e8925c82
20absdefgh52daced2e8925c8252abcdefwh52d2ced2e8925c86
21abkdefgh52d2eed2e8925c8253abcdefoh52d2ced2e8925d82
22abgdefghd2d2ced2e8925c8254abcdefch52d2ced268925c82
23abadefgh52d2ccd2e8925c8255abcdefeh52d28ed2e8925c82
24abbdefgh52d2ced2e892588256abcdeffh52d2c6d2e8925c82
25abcäefgh52d2ced2e8925e8257abcdefgè52d3ced2e8925c82
26abc$efgh52d2ced2a8925c8258abcdefg(52d2ced2e8125c82
27abcdefgh52c2ced2e8925c8259abcdefgh52d2ced2e8925c80
28abctefgh52d2cedae8925c8260abcdefgx52d2ced2e8965c82
29abclefgh52d2ced2e9925c8261abcdefg‘52d2ced2c8925c82
30abc‘efgh52d2ce92e8925c8262abcdefgl52d2ced2e892dc82
31abcfefgh52d2ced2f8925c8263abcdefgj52d2ced2ea925c82
32abceefgh52d2ced2ec925c8264abcdefgi56d2ced2e8925c82