Cryptography Reference
In-Depth Information
Diagrams 3.2 and 3.3 give a succinct presentation of S-DES.
Diagram 3.2 The S-DES Encryption Flow Chart
input:
m
=(
m
1
m
2
m
3
m
4
m
5
m
6
m
7
m
8
)
IP
m
2
m
6
m
3
m
1
m
4
m
8
m
5
m
7
F
(
m
4
m
8
m
5
m
7
,k
1
)
✄
✂
✁
+
←
u
1
u
2
u
3
u
4
m
4
m
8
m
5
m
7
SW
m
4
m
8
m
5
m
7
u
1
u
2
u
3
u
4
F
(
u
1
u
2
u
3
u
4
,k
2
)
✄
✂
✁
+
←
v
1
v
2
v
3
v
4
u
1
u
2
u
3
u
4
IP
−
1
output:
c
=(
c
1
c
2
c
3
c
4
c
5
c
6
c
7
c
8
)
The action between
IP
and
SW
is round 1, namely, the execution of
f
k
1
,
and the action between
SW
and
IP
−
1
is round 2, the action of
f
k
2
.
Search WWH ::
Custom Search