Escolar Documentos
Profissional Documentos
Cultura Documentos
56 bit key
64 bit input
Initial permutation
56 bit key
Initial permutation
48 bit key k1
Round 1
Round 1
48 bit key k2
Round 2
Round 2
Round 16
48 bit key k1
Round 16
Left/right reversal
Left/right reversal
28 bits
28 bits
c i-1
Rotate left
Same keys as for
Encryption but in
Reverse order
ci
Rotate left
28 bits
di
28 bits
Round 16 with k 1
Left/right reversal
Final permutation
NB Initial and final permutations are inverses
of each other and have no security value
ki k
k
24 bits
24 bits
64 bit input
L n 32 bits
64 bit output
Rn 32 bits
Mangler
L n 32 bits
Rn 32 bits
Mangler
kn
+
R n+132 bits
L n+132 bits
R n+132 bits
L n+132 bits
64 bit output
64 bit input
Mangler Overview
R = 32 bits = 8 x 4 bits 8 x 6 bits by copying last 2 bits in every 4
Take 48 bit key k and add mod 2 to expanded 48 bit R
Rn+1 = Ln
MK (Rn )
n
Therefore
Rn+1
kn
Established 1991
64-bit plaintext 64-bit ciphertext
128-bit key
Round structure and Mangler similar to
DES
IDEA Overview
64-bit input
128-bit key
key expansion
Xa X b X c Xd
K1 K2 K 3 K 4
Round 1
Round 2
Round 17
64-bit output
K5 K6
K49K50K 51K 52
Xa
Xb
Ka
Xc
Kb
Xd
Kc
Xb
Yin
Zin
Mangler
Function
Kd
Ke
kf
Yout Zout
Xa
Xb
Xc
Xd
Xa
Xb
Xc
Xd
IDEA Decryption
All processes the same
Even round is its own inverse (use same
keys)
Odd rounds use inverse keys
Advanced Encryption
Standard