SlideShare a Scribd company logo
1
RC4 Algorithm :
 RC4 is a Stream cipher designed in 1987 by Ron Rivets for RSA Security.
 It is variable key –size stream cipher with byte-oriented operations.
 The algorithm is based on the use of random permutation.
o K- is Key
o S- S is State vector having plain text.
INITIALIZATION OF S :
To begin,the entriesof Sare setequal tothe valuesfrom0 through255 in ascendingorder;that
is, S[0] 0, S[1] 1, . . ., S[255] 255.
A temporary vector,T, is also created.
If the length of the key K is 256 bytes, then K is transferred to T. Otherwise, for a key of length
keylenbytes,the firstkeylenelements of T are copied from K, and then K is repeated as many times as
necessary to fill out T.These preliminary operations can be summarized as:
Figure 1 Initialization of S
Initial Permutation of S:
Nextwe use T to produce the initial permutationof S.Thisinvolvesstarting with S[0] and going through
to S[255] and, foreach S[i],swappingS[i]with another byte in S according to a scheme dictated by T[i]:
STREAM GENERATION: Once the S vector is initialized, the input key is no longer used. Stream
generationinvolvescyclingthroughall the elementsof S[i] and,foreachS[i],swappingS[i] with another
byte in S according to a scheme dictated by the current configuration of S. After S[255] is reached, the
process continues, starting over again at S[0]:
2
BLOWFISH:
BLOWFISH isa symmetricblockcipherdevelopedbyBruce Schneier.BLOWFISH wasdesignedtohave
the followingcharacteristics:
Fast: Blowfishencryptsdataon 32 bit microprocessorsata rate of 18 clock cyclesperbyte.
Compact:Blowfishcanrun inlessthan5K of memory.
Simple:Blowfish’ssimple structure iseasytoimplementandeasesthe taskof determiningthe strength
of the algorithm.
3
Variable secure:The keylengthisvariable andcanbe as longas 448 bits.Thisallowsa tradeoff between
higherspeedandhighersecurity.
Subkeyand S-Box Generation:
Blowfishmakesuse of akeythat rangesfrom32 bitsto 448 bits( 1 to 14 32 bitwords).
Keyisusedto generate 18 sub keyseachof 32 bitsandfour 8*32 S-boxes.
The keysare storedinK-array:
4
5
IDEA (INTERNATIONAL DATA ENCRYPTION ALGORITHM):
6
Keygenerationanduse of subkeys:
The processcontinuesforrestof the rounds.(Look additional informationforbetterclarification)
OperationsusedinEverysingle round:
1. Multiplication
2. Addition
3.Bitwise XOROperator
7
8
ADDITIONAL INFORMATIONFOR BETTER UNDAERSTANDING OF ALGORITHM
What happensin each single round:
9

More Related Content

Viewers also liked

Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
Chamath Sajeewa
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
Zakaria Zubi
 
3. el ejercicio y deporte en ninos y adolescentes (1)
3. el  ejercicio y deporte en ninos y adolescentes (1)3. el  ejercicio y deporte en ninos y adolescentes (1)
3. el ejercicio y deporte en ninos y adolescentes (1)
Daniwp03
 
Peinados p&m para ti
Peinados p&m para tiPeinados p&m para ti
Peinados p&m para ti
astridsoler
 
Angelo bersani il mediatore agenzia immobiliare
Angelo bersani   il mediatore agenzia immobiliareAngelo bersani   il mediatore agenzia immobiliare
Angelo bersani il mediatore agenzia immobiliare
Stefano Torre
 
Newsletter 2017 - Febrero
Newsletter 2017 - FebreroNewsletter 2017 - Febrero
Newsletter 2017 - Febrero
Educampo
 
La alimentación humana
La alimentación humanaLa alimentación humana
La alimentación humana
borawer
 

Viewers also liked (8)

Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 
3. el ejercicio y deporte en ninos y adolescentes (1)
3. el  ejercicio y deporte en ninos y adolescentes (1)3. el  ejercicio y deporte en ninos y adolescentes (1)
3. el ejercicio y deporte en ninos y adolescentes (1)
 
Peinados p&m para ti
Peinados p&m para tiPeinados p&m para ti
Peinados p&m para ti
 
Angelo bersani il mediatore agenzia immobiliare
Angelo bersani   il mediatore agenzia immobiliareAngelo bersani   il mediatore agenzia immobiliare
Angelo bersani il mediatore agenzia immobiliare
 
Newsletter 2017 - Febrero
Newsletter 2017 - FebreroNewsletter 2017 - Febrero
Newsletter 2017 - Febrero
 
La alimentación humana
La alimentación humanaLa alimentación humana
La alimentación humana
 

Similar to Rc4 blowfish idea

Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptx
UrjaDhabarde
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” Nirav Desai
 
Crack wep-wifi-under100seconds (copied)
Crack wep-wifi-under100seconds (copied)Crack wep-wifi-under100seconds (copied)
Crack wep-wifi-under100seconds (copied)Pedro Mateus
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
CSCJournals
 
chap3.pdf
chap3.pdfchap3.pdf
chap3.pdf
NickySanthosh1
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
RAMPRAKASHT1
 
WiFi Security Explained
WiFi Security ExplainedWiFi Security Explained
WiFi Security Explained
Somenath Mukhopadhyay
 
information security(Feistal Cipher)
information security(Feistal Cipher)information security(Feistal Cipher)
information security(Feistal Cipher)
Zara Nawaz
 
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTIONRANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
ijcisjournal
 
Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text
Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text
Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text
ijcisjournal
 
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxBlock Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
HodaAhmedBekhitAhmed
 
Unit 2
Unit  2Unit  2
Unit 2
tamil arasan
 
Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100seconds
mvde3000
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 

Similar to Rc4 blowfish idea (20)

Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptx
 
IJEIR_1615
IJEIR_1615IJEIR_1615
IJEIR_1615
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
 
Crack wep-wifi-under100seconds (copied)
Crack wep-wifi-under100seconds (copied)Crack wep-wifi-under100seconds (copied)
Crack wep-wifi-under100seconds (copied)
 
Ch06
Ch06Ch06
Ch06
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
 
chap3.pdf
chap3.pdfchap3.pdf
chap3.pdf
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
WiFi Security Explained
WiFi Security ExplainedWiFi Security Explained
WiFi Security Explained
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
information security(Feistal Cipher)
information security(Feistal Cipher)information security(Feistal Cipher)
information security(Feistal Cipher)
 
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTIONRANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
 
Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text
Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text
Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text
 
32.pptx
32.pptx32.pptx
32.pptx
 
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxBlock Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
 
Unit 2
Unit  2Unit  2
Unit 2
 
Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100seconds
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 

Rc4 blowfish idea

  • 1. 1 RC4 Algorithm :  RC4 is a Stream cipher designed in 1987 by Ron Rivets for RSA Security.  It is variable key –size stream cipher with byte-oriented operations.  The algorithm is based on the use of random permutation. o K- is Key o S- S is State vector having plain text. INITIALIZATION OF S : To begin,the entriesof Sare setequal tothe valuesfrom0 through255 in ascendingorder;that is, S[0] 0, S[1] 1, . . ., S[255] 255. A temporary vector,T, is also created. If the length of the key K is 256 bytes, then K is transferred to T. Otherwise, for a key of length keylenbytes,the firstkeylenelements of T are copied from K, and then K is repeated as many times as necessary to fill out T.These preliminary operations can be summarized as: Figure 1 Initialization of S Initial Permutation of S: Nextwe use T to produce the initial permutationof S.Thisinvolvesstarting with S[0] and going through to S[255] and, foreach S[i],swappingS[i]with another byte in S according to a scheme dictated by T[i]: STREAM GENERATION: Once the S vector is initialized, the input key is no longer used. Stream generationinvolvescyclingthroughall the elementsof S[i] and,foreachS[i],swappingS[i] with another byte in S according to a scheme dictated by the current configuration of S. After S[255] is reached, the process continues, starting over again at S[0]:
  • 2. 2 BLOWFISH: BLOWFISH isa symmetricblockcipherdevelopedbyBruce Schneier.BLOWFISH wasdesignedtohave the followingcharacteristics: Fast: Blowfishencryptsdataon 32 bit microprocessorsata rate of 18 clock cyclesperbyte. Compact:Blowfishcanrun inlessthan5K of memory. Simple:Blowfish’ssimple structure iseasytoimplementandeasesthe taskof determiningthe strength of the algorithm.
  • 3. 3 Variable secure:The keylengthisvariable andcanbe as longas 448 bits.Thisallowsa tradeoff between higherspeedandhighersecurity. Subkeyand S-Box Generation: Blowfishmakesuse of akeythat rangesfrom32 bitsto 448 bits( 1 to 14 32 bitwords). Keyisusedto generate 18 sub keyseachof 32 bitsandfour 8*32 S-boxes. The keysare storedinK-array:
  • 4. 4
  • 5. 5 IDEA (INTERNATIONAL DATA ENCRYPTION ALGORITHM):
  • 6. 6 Keygenerationanduse of subkeys: The processcontinuesforrestof the rounds.(Look additional informationforbetterclarification) OperationsusedinEverysingle round: 1. Multiplication 2. Addition 3.Bitwise XOROperator
  • 7. 7
  • 8. 8 ADDITIONAL INFORMATIONFOR BETTER UNDAERSTANDING OF ALGORITHM What happensin each single round:
  • 9. 9