Cryptography Reference
In-Depth Information
Diagrams 3.2 and 3.3 give a succinct presentation of S-DES.
Diagram 3.2 The S-DES Encryption Flow Chart
input: m =( m 1 m 2 m 3 m 4 m 5 m 6 m 7 m 8 )
IP
m 2 m 6 m 3 m 1 m 4 m 8 m 5 m 7
F ( m 4 m 8 m 5 m 7 ,k 1 )
+
u 1 u 2 u 3 u 4 m 4 m 8 m 5 m 7
SW
m 4 m 8 m 5 m 7 u 1 u 2 u 3 u 4
F ( u 1 u 2 u 3 u 4 ,k 2 )
+
v 1 v 2 v 3 v 4 u 1 u 2 u 3 u 4
IP 1
output: c =( c 1 c 2 c 3 c 4 c 5 c 6 c 7 c 8 )
The action between IP and SW is round 1, namely, the execution of f k 1 ,
and the action between SW and IP 1 is round 2, the action of f k 2 .
Search WWH ::




Custom Search