Cryptography Reference
In-Depth Information
2. L ( d j = F ( R ( d j )
R ( d j .
3. SW ( R ( e j ,L ( e )
).
j
Lastly, unswap the last pair, then execute, L ( d )
17
= R ( d )
16
P 1 and R ( d )
=
17
L ( d )
16
P 2 . Diagrams 3.4 and 3.5 illustrate Blowfish encryption/decryption.
Diagram 3.4 Blowfish Encryption
Plaintext (64 bits)
L ( e 0 (32 bits) R ( e 0 (32 bits)
L ( e )
0
R ( e )
0
P 1
+
Roun d 1
F
R ( e )
1
−−−−→
+
R ( e )
1
L ( e )
1
L ( e )
1
R ( e )
1
. . .
. . .
P 16
+
Roun d 1 6
F
R ( e )
16
−−−−→
+
R ( e )
16
L ( e )
16
L ( e )
16
R ( e )
16
R ( e )
16
L ( e )
16
P 18
+
+
P 17
L ( e )
17
R ( e )
17
Ciphertext (64 bits)
Search WWH ::




Custom Search