Text this: Practical security analysis and attack strategies on permutation functions used in IoT supply chain systems