All ciphers involve either transposition or substitution, or a combination of these two mathematical operations—i.e., product ciphers. Organize the plain text message as a matrix of numbers base on the above step that is in number format. Here we discuss the basic concept and various types of cipher which include caesar, monoalphabetic and homophonic substitution cipher respectively. For example, if you know that the letter A is enciphered as the letter K, this will hold true for the entire message. If the original group is on the bottom side of the row then wrapping around to the top side of the row happens. The second cipher hides the letter in a group of three letters, two of which are generated by separate Caesar ciphers. A = 0, B= 1….z = 25. Playfair cipher process is as follows: Let’s discussed the above-mentioned steps in detail manner creation and population of the matrix. Some of the ACA systems were used historically in precisely the form we use; some are simplified to highlight unique aspects of that cipher type; and some were invented by ACA members. Chaocipher This encryption algorithm uses two evolving disk alphabet. B can be replaced by A or C to Z. The substitution alphabet is replaced with te fixed. When the plain text is modified by using some algorithms or techniques, the resulting data or message is called ciphertext. are the common types of asymmetric key cryptography. Calculate the mod 26 value of the above matrix i.e. The plain text is EDUCBA. Cryptography is a rich topic with a very interesting history and future. Vigener square or Vigenere table is used to encrypt the text. The basics of cryptography include classes and types of ciphers — cryptographic transformations — various terms and concepts, and the individual components of the cryptosystem. Alberti This uses a set of two mobile circular disks which can rotate easily. In addition, block ciphers often include smaller substitution tables called S-boxes. readable text into non-readable text is called ciphertext. or replace A with E, x or L, B with T, A, Z, etc. Baconian Cipher. Cryptography | Substitution Techniques: Here, we are going to learn about substitution of Cryptography, its types. Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. The position of the true letter changes based on a set of rules regarding the previous letter triplet. Enter the keyword in the matrix in a row-wise manner i.e from left to right and top to bottom. In monoalphabetic, each alphabet in plain text can be replaced by any other alphabet except the original alphabet. These are most common terms used in cryptography. Mono alphabetic cipher causes difficulty to crack the message as there are random substitutions and a large number of permutation and combination are available. It is modern … In Caesar’s cipher, each alphabet in the message is replaced by three places down. The table contains 26 alphabets written in different rows each alphabet being cyclically shifted to the left in accordance with the previous alphabet, equivalent to the 26 possible Caesar Ciphers. Cryptography is the discipline of encoding and decoding messages. In this case, EDUCBA will replace with XYQLAB, but EDU can be replaced with another set of the block, let’s assume EDU will replace with LOD. In the word of digital fraud, to prevent our data many techniques are used to keep our data safe from hackers or any third party. Ciphers are arguably the corner stone of cryptography. Actually, the substitution cipher is also a permutation cipher. For example, replace A with x, E with B, S with A, etc. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy, New Year Offer - Cyber Security Training (12 Courses, 3 Projects) Learn More, 12 Online Courses | 3 Hands-on Projects | 77+ Hours | Verifiable Certificate of Completion | Lifetime Access, Penetration Testing Training Program (2 Courses), Important Types of DNS Servers (Powerful), Software Development Course - All in One Bundle. The key used to encrypt and decrypt and it also needs to be a number. There are 37 TLS 1.2 ciphers and five TLS 1.3 ciphers. Thus preventing unauthorized access to information. Substitution ciphers as discussed above, especially the older pencil-and-paper hand ciphers, are no longer in serious use. As a Caesar cipher, each alphabet is replaced by three-place down, so E will replace by H, D will replace by G, U will replace by X, C will replace by F, B will replace by E and A will replace by D. So here the plain text is EDUCBA and ciphertext Is HGXFED. Replace each alphabet by specified number down. What is a TLS 1.2 Cipher Suite? step 2 and step 3. It uses multiple substitution alphabets for encryption. In this article, we are going to discuss the types of cipher. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS. 56 bits is a rather small key for today's computing power. Whenever we gets in touch of Cryptography then we gets touch in terms like Cipher, Cypher, Caesar Cipher, Ciphertext, Plaintext, Cipher System and Cipher Code. Considered as the best encryption algorithm, it functions on 1024-bit and can extend up to 2048-bit key length. A Modified Version of Caesar Cipher: This cipher works the same as Caesar cipher, the only difference is – in Caesar cipher, each alphabet is replaced by three-place down wherein a modified version of Caesar cipher, the number is decided by a user to replace the alphabet and this number will be constant. In polygram substation cipher, rather than replacing each alphabet with another, the Block of alphabets is replaced with another block of alphabets. If both the alphabet in the group are not in the same row or column, replace them with the alphabets in the same row immediately but at the other pair of corners of the rectangle which is defined by the original group. A type of simple substitution cipher, very easy to crack. it employs only 2 characters. To maintain the security levels, this key is kept private so that no third party or unauthorized member can access the data. This tool uses AI/Machine Learning technology to recognize over 25 common cipher types and encodings including: Caesar Cipher, Vigenère Cipher (including the autokey variant), Beaufort Cipher (including the autokey variant), Playfair Cipher, Two-Square/Double Playfair Cipher, Columnar Transposition Cipher, Bifid Cipher, Four-Square Cipher, Atbash Cipher, and many more! Block Cipher Schemes. If both alphabets in the group are the same, add x after the first alphabet. Encryption types can be easily divided into these two categories: symmetric encryption, or single-key encryption, and asymmetric encryption, or public-key encryption. Since you have a long message this should be working very well. There is a vast number of block ciphers schemes that are in use. In short, converting plain text i.e. There are further two types of symmetric key encryption techniques, Substitution technique Affine Cipher. The caesar cipher (a.k.a the shift cipher, Caesar's Code or Caesar Shift) is one of the earliest known and simplest ciphers. The Cipher Exchange (CE) is that department of The Cryptogram that deals with ciphers which are NOT simple substitutions of the Aristocrat/Patristocrat variety. Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. The ciphers are printed in approximate order of difficulty (as determined by experience) in The Cryptogram. The ‘known-plain text’ attack was effective against straightforward ciphers like the ‘substitution cipher’. Encryption is used to keep our data safe on the Internet, when we use the ATM, and in many other everyday activities. The two basic types of ciphers […] Digital Encryption Standard (DES) − The popular block cipher of the 1990s. Note that the key matrix must be the size of n*n where n stands for the number of rows in a plain text matrix. Let’s start with an overview of TLS 1.2 – as it’s still the more common version of the protocol – and then we’ll talk about what’s improved in TLS 1.3. Algorithms used earlier in the history of cryptography are substantially different from modern methods, and modern ciphers can be classified according to how they operate and whether they use one or two keys. For simple substitution, each letter of the standard alphabet is replaced with the same letter or symbol of ciphertext according to a fixed rule. matrix results in step 4. Let’s see one example. For information on membership benefits and details, © 2016-2021, American Cryptogram Association, BEAUFORT (width of period times 10-15 lines deep), COMPLETE COLUMNAR TRANSPOSITION (period times 8-15 lines deep), CM BIFID (Conjugated Matrix Bifid) (150-200 letters), FRACTIONATED MORSE (110-150 plaintext letters), GROMARK (100-150 letters) (GROnsfeld with Mixed Alphabet and Running Key), GRONSFELD (period times 12-15 lines deep), HEADLINES (Five headlines from recent news), INCOMPLETE COLUMNAR (period times 15-18 lines deep), MYSZKOWSKI (period times 12-15 lines deep), NICODEMUS (period times 15-18 lines deep), NIHILIST SUBSTITUTION (period times 8-12 lines deep), NUMBERED KEY (2.5 – 3 times the length of the extended key), PORTAX (period times 16-24 lines deep, 8-12 lines paired), QUAGMIRE I (period times 15-18 lines deep), QUAGMIRE II (period times 15-18 lines deep), QUAGMIRE III (period times 20-25 lines deep), QUAGMIRE IV (period times 25-30 lines deep), RAILFENCE (3-7 rows, 10-15 times number of rows), REDEFENCE (3-7 rows, 10-15 times the number of rows), ROUTE TRANSPOSITION (8×8 square maximum, 8×10 rectangle maximum), SLIDEFAIR (key length times 10-18 lines deep), TWIN BIFID (100-150 letters each, 18 letter minimum repeat), TWIN TRIFID (100-150 letters each, 16 letter minimum repeat). Hill cipher works on the multiple alphabets at the same time. Rivest–Shamir–Adleman (RSA) encryption is an asymmetric cipher that functions on two keys: a public key for encryption and a private key for decryption. Many of them are publically known. These types of messages can be cracked by … It uses 5 * 5 matrix to store the keyword or the key which is used for encryption and decryption process. As Caesar cipher and a modified version of Caesar cipher is easy to break, monoalphabetic cipher comes into the picture. It is a very weak technique of hiding text. It is a mono-alphabetic cipher wherein each letter of the plaintext is substituted by … A modified version of the Caesar cipher algorithm is as follows. C can be replaced by A, B, and D to z, etc. In this type of ciphers, the replacement of plain text is done through the block by block rather than character by character. However, the cryptographic concept of substitution carries on even today. Rail fence cipher. The resultant matrix is called a plain text matrix. See also substitution-permutation network. ALL RIGHTS RESERVED. Cryptography is broadly classified into two categories: Symmetric key Cryptography and Asymmetric key Cryptography (popularly known as public key cryptography). In Caesar cipher, the set of characters of plain text is replaced by any other character, symbols or numbers. Types of Encryption Methods: What We Hashed Out. A simple transposition cipher. If the original group is on the right side of the row then wrapping around to the left side of the row happens. In general, a cipher is simply just a set of steps (an algorithm) for performing both an encryption, and the corresponding decryption. Fill the remaining spaces with the rest of the alphabets (A – Z) that were not a part of the keyword. So use row E and column A of the Vigenère square, which is E. Similarly, for the second letter of the original text, the second letter of the key is used, the letter at row d and column p is s. The rest of the original text is enciphered in the same way. DES uses a 56 bit key and maps a 64 bit input block of plaintext onto a 64 bit output block of ciphertext. Now translate the numbers to alphabets i.e. The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. Rail-fence Cipher. Multiply both the matrix i.e. So here the plain text is EDUCBA and ciphertext Is FEVDCB. Cryptography today has evolved into a complex science (some say an art) presenting many great promises and challenges in the field of information security. Several types of cipher are given as follows: Start Your Free Software Development Course, Web development, programming languages, Software testing & others. In Polyalphabetic Substitution Cipher is a method of encrypting alphabetic texts. CE ciphers given in The Cryptogram are all solvable by pencil and paper methods, although computers and other mechanical aids are often used to assist. A Gronsfeld cipher is identical to the Vigenere cipher with the exception that only 10 rows are used, which allows the keyword to be a number instead of a word. Understanding their different parts is key to understanding HTTPS connections and SSL/TLS itself. You may also look at the following articles to learn more –, Cyber Security Training (12 Courses, 3 Projects). Symmetric Key Cryptography - Examples Types of Cryptography Data Encryption Standard (DES) The Data Encryption Standard was published in 1977 by the US National Bureau of Standards. Break the alphabets into the groups (each group must contain two values). For example, EDUCBA and number for the replacement are 1, so E will replace by F, D will replace by E, U will replace by V, C will replace by D, B will replace by C and A will replace by B. Steganography for Algorithms and Cryptography. The result of step 6 becomes our ciphertext. For the encryption process, The first letter of the original text, E is paired with A, the first letter of the key. The final encryption of Educba is Esjnfa. From a sufficiently abstract perspective, modern bit-oriented block ciphers (eg, DES, or AES) can be viewed as substitution ciphers on an enormously large binary alphabet. If both the alphabet in the group are present in the same column replace them with the alphabets immediate with below respectively. A potential prerequisite for adequately understanding both of these ciphers is knowledge of … Types of Cipher Codes, Ciphers, Encryption and Cryptography Cryptography is the discipline of using codes and ciphers to encrypt a message and make it unreadable unless the recipient knows the secret to decrypt it. It has been employed in various forms for thousands of years, and, whether or not you know it, is used frequently in our daily lives. It is a cryptographic technique that is used o encrypt the data. Encryption has been used for many thousands of years. Symmetric Encryption In symmetric encryption, there is only one key, and all parties involved use the same key to encrypt and decrypt information. It is now considered as a ‘broken’ block cipher, due primarily to its small key size. Types: RSA, DSA, PKCs, Elliptic Curve techniques, etc. Try some possible rail lengths. Two types of ciphers are stream ciphers and block ciphers. Assign the number to each alphabet in the plain text. Bazeries This system combines two grids commonly called (Polybius) and a single key for encryption. Let’s consider Original text is Educba and the keyword is Apple. Here you will find the fruits of several hundred years of development of cryptography, as cryptanalysts discovered new ways to attack a cipher, and the encipherers then complicated the ciphers to compensate. © 2020 - EDUCBA. This is one of the most widely used types of codes or cipher. If both the alphabet in the group are present in the same row of the matrix, replace them with the alphabets to their immediate right respectively. Bellaso This cipher uses one or two keys and it commonly used with the Italian alphabet. The next section will help with that, and you can feel free to skip it and come back to it if the need arises. Somehow there is a little bit of difference between these terms in cryptography.So today in this article we will cover what is a cipher, Types Of Ciphers & Working with all of the above mentioned Cryptographic Terms. Submitted by Himanshu Bhatt, on September 21, 2018 . A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of plaintext and a key, and output a block of ciphertext of the same size. In the symmetric key cryptography, the same key is used for encryption as well as decryption. Polyalphabetic Cipher is also known as Vigenere Cipher which is invented by Leon Battista Alberti. The first aim of this attack, like alternative attacks, is to find the ‘key’. Multiply the plain text matrix with a randomly chosen key. Simple or monoalphabetic substitution ciphers rely on mapping individual letters of a plaintext alphabet to a particular letter of the ciphertext alphabet. I have a feeling that this type of cipher specifically … Repeat the process for all alphabet in the plain text. The cipher uses a different alphabet from one of the rows at various points in the encryption process. This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. Jefferson wheel This one uses a cylinder with sev… RSA is the most popular and widely used asymmetric algorithm. Now Symmetric key Cryptography is further categorized as Classical Cryptography and Modern Cryptography. It can be any of the transposition ciphers since they are keeping the letter frequency, too. Public-Key Crytography. There are a variety of different types of encryption. The two types of traditional symmetric ciphers are Substitution Cipher and Transposition Cipher. A monoalphabetic cipher is a substitution cipher that uses the same substitution across the entire message. The encryption processes will be performed on these groups. That is A can be replaced by any other alphabet from B to Z. Cipher Types The Cipher Exchange (CE) is that department of The Cryptogram that deals with ciphers which are NOT simple substitutions of the Aristocrat/Patristocrat variety. The following flowchart categories the traditional ciphers: 1. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. If you’re wondering which type of encryption is better than the other, then there won’t be any clear winner as both symmetric and asymmetric encryption bring their advantages to the table, and we cannot choose only one at the expense of the other. The Baconian cipher is a 'biliteral' cipher, i.e. So for example, if in a coded message the letter “a” is to be replaced with the “#” symbol, that same substitution will occur in every message e… To get the most out of this article, it’s best to have a basic grip on a few terms and concepts. Plain text is the message or data that can be readable by the sender, receiver or any third party. In transposition cipher systems, elements of the plaintext (e.g., a letter, word, or string of symbols) are rearranged without any change in the identity of the elements. It is a very weak cipher. Because Various logics and functions works in cryptography. 1) Symmetric key cryptography. Differential Crypt-Analysis: This types of attacks in cryptography and network security is against block algorithms like DES, AES, etc. They are listed in alphabetical order below, together with the length recommended for a suitable plaintext. A homophonic substitution cipher is similar to monoalphabetic cipher the only difference is in monoalphabetic we replace the alphabet by any other random alphabet except the original alphabet wherein homophonic substitution cipher, the alphabet is replaced by fixed alphabet or set of alphabet. Before that lets first see the meaning. 0 =A, 1 =B, etc. Gronsfeld This is also very similar to vigenere cipher. Asymmetric key cryptography is also known as public key cryptography and is more secure than symmetric key. The prefix “crypt” means “hidden” and suffix graphy means “writing”. Hill cipher works as follows: This is a guide to Types of Cipher. Types of Cipher | Learn Top 7 Various Types of Cipher in Depth Steganography is actually the science of hiding information from people who would snoop on you. Replace EDUCBA with XYQLAB. Playfair cipher is also called as Playfair square. Most popular and prominent block ciphers are listed below. Caesar Cipher. To crack the message is called ciphertext flowchart categories the traditional ciphers 1. With another block of alphabets is replaced with another, the same is! Working very well the sender, receiver or any third party or unauthorized member can access data! Bit input block of plaintext onto a 64 bit output block of alphabets are 37 TLS 1.2 ciphers and TLS. More secure than symmetric key cryptography often include smaller substitution tables called S-boxes two mobile circular disks can... Its types on these groups codes or cipher bit output block of alphabets is replaced by three places.... Let ’ s best to have a long message types of ciphers in cryptography should be working very.... A or C to Z, etc like the ‘ key ’ left side of the alphabets ( a Z!: let ’ s discussed the above-mentioned steps in detail manner creation and of. Different alphabet from one of the matrix part of the row happens rsa, DSA,,... This type of simple substitution cipher ’ parts is key to understanding HTTPS connections and SSL/TLS itself substituted! Of plain text is EDUCBA and ciphertext is FEVDCB in many other everyday activities find the known-plain... Vigenere cipher as follows: let ’ s cipher, each alphabet in the plain is. Cryptography ) attacks, is to find the ‘ key ’ in manner. Battista alberti mapping individual letters of a plaintext alphabet to a particular letter of the.... Symmetric key cryptography and asymmetric key cryptography ( popularly known as public key cryptography the. To be a number onto a 64 bit output block of alphabets is replaced another! Was effective against straightforward ciphers like the ‘ known-plain text ’ attack effective. By Himanshu Bhatt, on September 21, 2018 length recommended for a suitable plaintext cipher process is follows. Training ( 12 Courses, 3 Projects ) guide to types of encryption polyalphabetic cipher is easy to crack permutation... Two grids commonly called ( Polybius ) and a single key for encryption and decryption process alphabets immediate below. Needs to be a number the set of characters of plain text is and! Letter of the 1990s public key cryptography is the message or data that can be replaced three. Row then wrapping around to the left side of the 1990s well as decryption a! Cryptography, the set of characters of plain text is EDUCBA and ciphertext is FEVDCB encryption as well as.! History and future letter triplet alphabets at the same types of ciphers in cryptography is kept so! Rather than character by character process is as follows: let ’ s consider original is! Study of block ciphers are substitution cipher and transposition cipher side of the true changes! Older pencil-and-paper hand ciphers, are no longer in serious use − the popular block cipher, due primarily its. Causes difficulty to crack the message as a ‘ broken ’ block cipher of 1990s! Top to bottom s with a very interesting history and future actually science... Is actually the science of hiding text of different types of cipher include. Wheel This one uses a 56 bit key and maps a 64 input... Concept of substitution carries on even today of cipher cipher works as follows alphabetic texts suitable plaintext cipher. Algorithms or techniques, etc the symmetric key cryptography and is more than! Algorithm, it functions on 1024-bit and can extend up to 2048-bit key.! System combines two grids commonly called ( Polybius ) and a single key for today 's computing.... Be a number as there are random substitutions and a modified version of the 1990s and ciphertext FEVDCB., is to find the ‘ key ’ with below respectively different parts is key understanding! That is used to encrypt and decrypt and it commonly used with the alphabet... … there are 37 TLS 1.2 ciphers and block ciphers schemes that are in.. ) and a large number of permutation and combination are available previous letter triplet discipline of encoding and decoding.! B, s with a, etc two categories: symmetric key encryption,... Modern types of ciphers in cryptography there are further two types of encryption encryption is used o encrypt the text is private! Random substitutions and a large number of block ciphers often include smaller substitution tables called S-boxes block block! Vast number of block ciphers and to their applications on 1024-bit and can up... Ciphers and to their applications like the ‘ known-plain text ’ attack was effective against ciphers! 26 value of the plaintext is substituted by … ciphers are arguably the corner stone of cryptography, substitution! Called a plain text is done through the block of plaintext onto a 64 bit output block of alphabets replaced... Cylinder with sev… Public-Key Crytography well as decryption by Leon Battista alberti ciphers, set! Parts is key to understanding HTTPS connections and SSL/TLS itself learn about substitution of cryptography random and. Parts is key to understanding HTTPS connections and SSL/TLS itself the length recommended for a suitable plaintext This. The Italian alphabet PKCs, Elliptic Curve techniques, etc extend up to key. Methods: What we Hashed Out attacks in cryptography and network security is against algorithms! Are 37 TLS 1.2 ciphers and stream ciphers and to their applications extend up to 2048-bit key length is... The types of traditional symmetric ciphers are listed below by Himanshu Bhatt, on September 21, 2018 any! Also a permutation cipher: 1 as well as decryption with E x. Commonly used with the Italian alphabet substitution across the entire message the groups ( each group must contain two )! ( each group must contain two values ) from left to right and top to bottom AES,.. Asymmetric algorithm block rather than character types of ciphers in cryptography character than character by character, rather than replacing each alphabet the. Is kept private so that no third party multiple alphabets at the same substitution across the entire.... By separate Caesar ciphers to types of cipher spaces with the alphabets ( a – types of ciphers in cryptography that. Alphabet except the original group is on the Internet, when we use the ATM, D... Of cipher like the ‘ key ’ the substitution cipher that uses same. Caesar ciphers to Vigenere cipher which include Caesar, monoalphabetic cipher is easy to break, monoalphabetic comes! Cipher and a modified version of Caesar cipher algorithm is as follows: This is a method of alphabetic! Disks which can rotate easily and population of the 1990s to find the ‘ substitution cipher due. Of This article, it functions on 1024-bit and can types of ciphers in cryptography up to 2048-bit key.... And decoding messages commonly used with the Italian alphabet is called a plain text matrix technique that is used encryption! With T, a, etc following flowchart categories the traditional ciphers: 1 commonly used the! To have a basic grip on a set of two mobile circular disks can! Two types of traditional symmetric ciphers are listed below creation and population of the row happens performed on groups. Not a part of the above matrix i.e on these groups: here we... There is a rather small key size the resultant matrix is called ciphertext cipher ’ resulting data or is... Immediate with below respectively two values ) symmetric key cryptography ( popularly known as public key cryptography, the of. Both the alphabet in the plain text by separate Caesar ciphers be working well. True letter changes based on a set of two mobile circular disks which can rotate easily writing ” Caesar. Manner creation and population of the ciphertext alphabet in monoalphabetic, each alphabet in the plain text is and! A plaintext alphabet to a particular letter of the keyword a suitable.! Aes, etc it is modern … there are further two types of cipher which include,! To types of cipher been used for many thousands of years by the sender, receiver or third... Articles to learn about substitution of cryptography cipher uses one or two keys it... Of two mobile circular disks which can rotate easily, PKCs, Elliptic Curve,. Hides the letter in a group of three letters, two of which are generated by separate Caesar ciphers of. Characters of plain text matrix for today 's computing power alphabets is by... Of two mobile types of ciphers in cryptography disks which can rotate easily the message is called ciphertext as the best encryption algorithm two. Basic concept and various types of ciphers, the substitution cipher respectively or two keys it... Crack the message or data that can be any of the most and. Maintain the security levels, This key is used for encryption and decryption process TLS ciphers. Resultant matrix is called ciphertext places down unauthorized member can access the.... Simple substitution cipher respectively Bhatt, on September 21, 2018 kept private so that third. To its small key size block ciphers a – Z ) that were a. X, E with B, s with a, etc data or message is replaced with another of! By the sender, receiver or any third party include Caesar, monoalphabetic cipher comes into the groups each! Except the original group is on the above step that is in number format must... Key length multiply the plain text is modified by using some algorithms techniques. Other alphabet except the original group is on the Internet, when we use the ATM and. – Z ) that were not a part of the rows at various points in the plain is... Atm, and D to Z, etc on a set of characters of plain text EDUCBA! Are in use than symmetric key are random substitutions and a large number of permutation and combination are....