Cryptography Reference
In-Depth Information
a) Strategy 1: Encoding P i,j
Q i,j
×
F
type I.a
128 x 128 128 x 8
b) Strategy 2: Encoding Q i,j
P i,j
8x8
Δ 1
Δ 1
Q i,j
×
F
type I.a
type II
128 x 128
128 x 8
T' i,j
Round 1
P i,j
8x8
IMC' 1
type II
Q i,j
T' i,j
type III
8x8
IMC' 1
P i,j
Δ 2 × Δ 1
1
8x8
type III
Q i,j
Δ 2 × Δ 1
1
8x8
type II
T' i,j
Round 2
P i,j
8x8
IMC' 2
Q i,j
type II
T' i,j
type III
8x8
IMC' 2
Δ 3 × Δ 1
2
Q i,j
type III
P 10
i,j
8x8
8x8
Δ 10 × Δ 1
9
Round 10
type II
T' 10
i,j
P 10
i,j
type II
Δ 1
10
8x8
type I.b
G
128 x 8
T' 10
i,j
Δ 1
10
G
type I.b
128 x 8
Fig. 2. Encoding The Mixing Bijections
 
Search WWH ::




Custom Search