Description: It's a substitution permutation network, in fact, a bit string is mainly transformed by two kinds, which are substitution and substitution, and obtain another bit string, so as to achieve the effect of encryption. But the premise is that this bit string can be restored by a similar means, which is the decryption.
To Search:
File list (Check if you may need any files):
main.c