Introduction - If you have any usage issues, please Google them yourself
The algorithm flow would have to deal with the binary string replacement IP key PC1 replacement (64 into 56), 3. Conducted 16 operations, for the i-th round operation: 1) the last PC1 key (removal of the first, the other after shift processing), about (28), respectively, rotate left one or two, then the shift key PC2 [i] replacement. 2) will handle the string equalization is divided into right and left bunches Li, Ri (32), and then the right string Ri develop new right string R ' (48-bit), R' is obtained in the previous step through the E box PC2 [i] subkey XOR operation results through the S-box output (48 into 32), and then through the P box direct replacement, with Li the XOR. 3) Ri is assigned to make Li, R ' assignment to Ri. 4) the combined processing string StrText = Li+Ri, 4. latest processing string for IP_1 replacement, replacement result is encrypted string or ask the the decrypted string encryption and decryption difference in each round operation, encryption use