Cryptography Reference
In-Depth Information
ROUND( F, c, d, a, b, 10, 17, 11 );
ROUND( F, b, c, d, a, 11, 22, 12 );
ROUND( F, a, b, c, d, 12, 7, 13 );
ROUND( F, d, a, b, c, 13, 12, 14 );
ROUND( F, c, d, a, b, 14, 17, 15 );
ROUND( F, b, c, d, a, 15, 22, 16 );
// Round 2
ROUND( G, a, b, c, d, 1, 5, 17 );
ROUND( G, d, a, b, c, 6, 9, 18 );
ROUND( G, c, d, a, b, 11, 14, 19 );
ROUND( G, b, c, d, a, 0, 20, 20 );
ROUND( G, a, b, c, d, 5, 5, 21 );
ROUND( G, d, a, b, c, 10, 9, 22 );
ROUND( G, c, d, a, b, 15, 14, 23 );
ROUND( G, b, c, d, a, 4, 20, 24 );
ROUND( G, a, b, c, d, 9, 5, 25 );
ROUND( G, d, a, b, c, 14, 9, 26 );
ROUND( G, c, d, a, b, 3, 14, 27 );
ROUND( G, b, c, d, a, 8, 20, 28 );
ROUND( G, a, b, c, d, 13, 5, 29 );
ROUND( G, d, a, b, c, 2, 9, 30 );
ROUND( G, c, d, a, b, 7, 14, 31 );
ROUND( G, b, c, d, a, 12, 20, 32 );
// Round 3
ROUND( H, a, b, c, d, 5, 4, 33 );
ROUND( H, d, a, b, c, 8, 11, 34 );
ROUND( H, c, d, a, b, 11, 16, 35 );
ROUND( H, b, c, d, a, 14, 23, 36 );
ROUND( H, a, b, c, d, 1, 4, 37 );
ROUND( H, d, a, b, c, 4, 11, 38 );
ROUND( H, c, d, a, b, 7, 16, 39 );
ROUND( H, b, c, d, a, 10, 23, 40 );
ROUND( H, a, b, c, d, 13, 4, 41 );
ROUND( H, d, a, b, c, 0, 11, 42 );
ROUND( H, c, d, a, b, 3, 16, 43 );
ROUND( H, b, c, d, a, 6, 23, 44 );
ROUND( H, a, b, c, d, 9, 4, 45 );
ROUND( H, d, a, b, c, 12, 11, 46 );
ROUND( H, c, d, a, b, 15, 16, 47 );
ROUND( H, b, c, d, a, 2, 23, 48 );
// Round 4
ROUND( I, a, b, c, d, 0, 6, 49 );
ROUND( I, d, a, b, c, 7, 10, 50 );
ROUND( I, c, d, a, b, 14, 15, 51 );
ROUND( I, b, c, d, a, 5, 21, 52 );
ROUND( I, a, b, c, d, 12, 6, 53 );
ROUND( I, d, a, b, c, 3, 10, 54 );
(Continued)
Search WWH ::




Custom Search