Introduction - If you have any usage issues, please Google them yourself
It's a substitution permutation network, in fact, a bit string is mainly transformed by two kinds, which are substitution and substitution, and obtain another bit string, so as to achieve the effect of encryption. But the premise is that this bit string can be restored by a similar means, which is the decryption.