Permutation - What it is in cryptography and how it differs from substitution

Permutation

What it is

A permutation is a cryptography trick that rearranges characters or bits without changing them. Think of it as shuffling the deck - the same cards, new order. By itself it only hides the order, but combined with other steps it helps build strong ciphers.

Why it matters

Permutation is a core building block in both old-school ciphers and modern algorithms. Paired with substitution (changing symbols), it creates the mix-and-mash that makes patterns hard to spot and messages hard to crack.

How it works - quick tour

  • Start with a message and a secret rule (the key) that tells where each character moves.

  • Example: using the rule 3-1-5-2-4, HELLO becomes LHOEL (take letters in that order).

  • Modern encryption applies many rounds of substitution + permutation to scramble data thoroughly.

Good to know

  • Permutation vs substitution: permutation only reorders, substitution changes symbols.

  • Because permutation keeps letter counts the same, it’s usually paired with substitution to defeat frequency analysis.

    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • Reverse Lookup

        What it is Reverse lookup is the process of taking an IP address and asking: which hostname/domain does this belong to? Instead of the usual DNS query (name → IP), it flips the direction (IP → name). This is useful for seeing who is behind an IP, ...
      • Zombie Process

        What it is A zombie process (also called defunct) is a program that already finished, but a tiny entry is still stuck in the system’s process list. This happens mostly on Linux/macOS when a “child” program ends and its “parent” hasn’t picked up the ...
      • SHA-1

        What it is SHA-1 is a one-way math function that turns any input (a file, a message, a certificate) into a short fingerprint called a hash. The output is always 160 bits long, no matter how big the input is. It’s great for quick “did this change?” ...
      • WEP & WPA

        What it is WEP and WPA are Wi-Fi security standards. WEP is the early, weak option that is easy to break. WPA and newer WPA2/WPA3 use stronger encryption to protect your Wi-Fi so others can’t read your traffic or hop on your network. More: ...
      • Steganalysis

        What it is Steganalysis is the art of finding secret data hidden inside normal-looking files - like a message tucked into a photo, song, or video. Unlike cryptography (which scrambles data), steganography tries to hide that data so nobody notices ...