Professional Documents
Culture Documents
Two approaches:
plaintext
Security through
obscurity
Good Idea
Key
algorithm
ciphertext
P-Boxes permutation
providing diffusion across S-box inputs
S-box (substitution)
3 bit
input
0
1
2
3
4
5
6
7
1
0
0
1
2
3
4
5
6
7
3 bit
output
1
1
0
P-box (permutation)
4 bit
input
1
0
1
0
Example 1