(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
− | [[Category:2015 Summer | + | [[Category:2015 Summer Cryptography Paar]] |
− | [[Category: | + | [[Category:Cryptography]] |
− | [[Category: | + | [[Category:Paar]] |
[[Category:slecture]] | [[Category:slecture]] | ||
− | <center><font size= | + | <center><font size= 6>DES - Decryption</font size> |
− | A [http://www.projectrhea.org/learning/slectures.php slecture] | + | A [http://www.projectrhea.org/learning/slectures.php slecture] on [[Cryptography]] by student Divya Agarwal and Katie Marsh. |
− | Partly based on the [[2015 Summer Cryptography Paar| | + | Partly based on the [[2015 Summer Cryptography Paar|Cryptography Summer 2015]] lecture material of Paar. |
</center> | </center> | ||
---- | ---- | ||
---- | ---- | ||
− | ==1. Introduction | + | ==1. Introduction == |
− | + | DEs as discussed is based on Feistel networks and in Feistel ciphers only the keyschedule has to be modified for decryption. | |
− | + | ||
---- | ---- | ||
Line 40: | Line 39: | ||
---- | ---- | ||
---- | ---- | ||
− | ==[[ | + | ==[[2015_Summer_Cryptography_Paar_Divya Agarwal and Katie Marsh_comments | Questions and comments]]== |
− | If you have any questions, comments, etc. please post them [[ | + | If you have any questions, comments, etc. please post them [[2015_Summer_Cryptography_Paar_Divya Agarwal and Katie Marsh_comments|here]]. |
---- | ---- | ||
− | [[2015 Summer Cryptography Paar|Back to 2015 Summer | + | [[2015 Summer Cryptography Paar|Back to 2015 Summer Cryptography Paar]] |
---- | ---- |
Latest revision as of 05:38, 18 June 2015
A slecture on Cryptography by student Divya Agarwal and Katie Marsh.
Partly based on the Cryptography Summer 2015 lecture material of Paar.
Contents
1. Introduction
DEs as discussed is based on Feistel networks and in Feistel ciphers only the keyschedule has to be modified for decryption.
2. Derivation (Replace by appropriate section title)
Text of second section goes here. Here is an example of a list
- Blah
- Blih
- Bloh
- Blouh
3. Example (Replace by appropriate section title)
Text of third section goes here. Here is an example of a picture
4. Conclusion (Replace by appropriate section title)
Text of fourth section goes here.
5. References
- Reference 1
- reference 2
Questions and comments
If you have any questions, comments, etc. please post them here.
Back to 2015 Summer Cryptography Paar