Cryptography Reference
In-Depth Information
K
1
⊕
F
K
2
⊕
F
K
3
⊕
F
Figure 2.2.
Function
(
F
K
1
,
F
K
2
,
F
K
3
).
is XORed to the other part. We obtain two parts which are then exchanged (except in
the final round). The round function uses subkeys derived from a secret key.
This elementary process is iterated, and the number of round function applications
is called the number of rounds. We usually denote
F
r
) the permutation ob-
tained from an
r
-round Feistel scheme in which the round functions are
F
1
,...,
(
F
1
,...,
F
r
. All
F
i
may come from a single function
F
with a parameter
K
i
defined by a subkey. We de-
note
F
i
=
F
K
i
. Fig. 2.2 illustrates a 3-round Feistel scheme. DES consists of 16 rounds.
More precisely, DES starts by a bit permutation IP, performs the Feistel cipher
using subkeys generated by a key schedule, and finally performs the inverse of the IP
permutation. This is illustrated in Fig. 2.3.
X
K
IP
K
1
K
2
Feistel
Schedule
K
16
IP
−
1
Y
Figure 2.3.
DES architecture.
Search WWH ::
Custom Search