This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Security depends primarily on S-boxes Each S-boxes maps 6 bits to 4 bits Unit 3 - 30 One Round of DES...
View Full Document
- Fall '10
- Information Security