Research Article

Two-Key Dependent Permutation for Use in Symmetric Cryptographic System

Table 5

Permutations affecting positions of all characters of the message .

. numberPermuted textNumber of positions affected

gcfhaedb8
dfghcbae8
bdgchfea8
dhecbgfa8