CFN

Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1

DES

Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1

3 DES

Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1
Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1

AES

Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1
Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1
Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1

Use the S-box and inverse S-box to calculate

Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1
Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1

The row rule of this cipher method

Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1

The column of this cipher method

Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1

Final step

Computer security(5): Symmetric Encryption and Message Confidentiality-Part 1

相关文章: