6Feistel Networks

In this chapter we will cover the following:

image   Cryptographic keys

image   Feistel functions

image   Pseudo-Hadamard transforms

image   MDS matrix

image   S-boxes and P-boxes

   Symmetric algorithms

   Methods for improving symmetric algorithms

This chapter ...

Get Modern Cryptography: Applied Mathematics for Encryption and Information Security now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.