Description: The algorithm flow would have to deal with the binary string replacement IP key PC1 replacement (64 into 56), 3. Conducted 16 operations, for the i-th round operation: 1) the last PC1 key (removal of the first, the other after shift processing), about (28), respectively, rotate left one or two, then the shift key PC2 [i] replacement. 2) will handle the string equalization is divided into right and left bunches Li, Ri (32), and then the right string Ri develop new right string R ' (48-bit), R' is obtained in the previous step through the E box PC2 [i] subkey XOR operation results through the S-box output (48 into 32), and then through the P box direct replacement, with Li the XOR. 3) Ri is assigned to make Li, R ' assignment to Ri. 4) the combined processing string StrText = Li+Ri, 4. latest processing string for IP_1 replacement, replacement result is encrypted string or ask the the decrypted string encryption and decryption difference in each round operation, encryption use
To Search:
File list (Check if you may need any files):
DES.c