Traditional protection methods often fall short in the face of evolving cyber threats. A novel approach gaining traction is text permutation technique, which scrambles letters within data to create seemingly meaningless strings. This hides the original information, rendering it incomprehensible to unauthorized individuals without the corresponding