Introduction - If you have any usage issues, please Google them yourself
DES encryption algorithm, the initial replacement, key replacement, key loops, key compression replacement, data expansion permutation,, S cartridge replacement, P cartridge replacement, replacement end