From the course: Symmetric Cryptography Essential Training
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Feistel ciphers
From the course: Symmetric Cryptography Essential Training
Feistel ciphers
- [Instructor] While they're not used in every case, Feistel networks are fundamental structures for block ciphers. They're a really nice way of combining permuatations and substitutions, which are applied to the plaintext repeatedly. Feistel networks are made up of rounds. Each time this package of permuatations and substitutions is applied to a plaintext block, that's one of those rounds. And then the actual set of transformations that's applied each round is called the round function. Within each of these rounds, Feistel networks use the subkey, or round key, which are smaller keys derived from the main key, with a key schedule. The only difference between encryption and decryption is which round key we use at each step. We essentially reverse the order of the round keys to do the decryption. One interesting property of Feistel networks is that it doesn't really matter how the round function works. The encryption will be reversible either way. Security of Feistel networks is…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Simple substitution ciphers5m
-
(Locked)
Polyalphabetic substitution ciphers6m 7s
-
(Locked)
Permutation and transposition ciphers2m 48s
-
(Locked)
Simple one-time pads with XOR2m 38s
-
(Locked)
S-Box and P-Box1m 44s
-
(Locked)
Feistel ciphers1m 55s
-
(Locked)
Linear-feedback shift registers (LFSRs)2m 22s
-
-
-
-