Answered You can hire a professional tutor to get the answer.
//www.in/files/RCCT-2014-III-CM/CryptographyTheoryandpractice(3ed).pdf Pg. 40 #1. Suppose that pi is the following permutation of {1,. Compute the...
http://www.ksom.res.in/files/RCCT-2014-III-CM/CryptographyTheoryandpractice(3ed).pdf
Pg. 40
#1.16
a. Suppose that pi is the following permutation of {1,.........8}.
Compute the permutation pi^-1.
b. Decrypt the following ciphertext, for a Permutation Cipher with m = 8, which was encrypted using the key pi:
TGEEMNELNNTDROEOAAHDOETCSHAEIRLM