Description: Algorithm flow
A binary string to be processed is substituted for IP
2 key the PC1 replacement (64 into 56)
16 operation, the operation for the i-th round:
1) about the results of the last PC1 key (remove the first time, the others have been shifting processing) (28) rotate left one or two, and then will shift key PC2 [i] replacement.
2) is divided into the equal treatment string around two bunches of Li, Ri (32), and then expand the right string Ri E box (48-bit), the right string R R and the previous step PC2 i] subkey XOR operation result is output via the S-box (48 to 32 conversion), and then directly through the P box replacement and XOR with Li.
3) the Ri to make Li, R is assigned to Ri.
4) merger deal with string StrText Ri = Li+.
4. Latest processing string IP_1 replacement, replacement results shall request string encryption or decryption string
Encryption and decryption of difference
In each round of operations, PC2 key e
To Search:
File list (Check if you may need any files):
DES.c