Construction Details
Let be the round function and let be the sub-keys for the rounds respectively.
Then the basic operation is as follows:
Split the plaintext block into two equal pieces, (, )
For each round, compute
- .
Then the ciphertext is .
Decryption of a ciphertext is accomplished by computing for
- .
Then is the plaintext again.
One advantage of the Feistel model compared to a substitution-permutation network is that the round function does not have to be invertible.
The diagram illustrates both encryption and decryption. Note the reversal of the subkey order for decryption; this is the only difference between encryption and decryption.
Read more about this topic: Feistel Cipher
Famous quotes containing the words construction and/or details:
“Theres no art
To find the minds construction in the face:
He was a gentleman on whom I built
An absolute trust.”
—William Shakespeare (15641616)
“Patience is a most necessary qualification for business; many a man would rather you heard his story than granted his request. One must seem to hear the unreasonable demands of the petulant, unmoved, and the tedious details of the dull, untired. That is the least price that a man must pay for a high station.”
—Philip Dormer Stanhope, 4th Earl Chesterfield (16941773)