Some Further Cryptographic Applications of Permutation Polynomials

A cryptographic system is described based on the use of systems of permutation polynomials over finite fields or rings. The method involves two steps of encipherment, but more than two steps can be used if desired.