Description: The principle of permutation cipher algorithm is to change the order of characters in plaintext without changing the plaintext characters, so as to realize the encryption of plaintext information. Permutation cipher is also called transposition cipher.
Programming to achieve matrix transposition password. Its encryption method is that the letters in the plaintext are arranged in a matrix according to a given order, and then the letters in the matrix are re assembled in the order provided by the key to form a ciphertext. For example, the plaintext is attack begins at five, the key is cipher, and the plaintext is placed in the matrix in the form of 6 letters per row, as follows:
A, t, t, a, C, K
B, e, G, I, N, s
A, t, F, I, V, e
According to the order in which the letters in the key cipher appear in the alphabet, a permutation is given:
According to the above permutation, the letters in the original matrix are arranged in the order of first, fourth, fifth, 3, 2 and 6, and the follo
To Search:
File list (Check if you may need any files):
Cipher.txt