This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Halves are swapped after last round so the actual ciphertext is (R 16 ,L 16 ) instead of (L 16 ,R 16 ). None of these serve any security purpose...
View Full Document
This note was uploaded on 03/17/2011 for the course ECE 4472 taught by Professor Ouda during the Fall '10 term at UWO.
- Fall '10
- Information Security