(DES Decryption)
 
Line 5: Line 5:
  
  
<center><font size= 4>DES - Decryption</font size>
+
<center><font size= 6>DES - Decryption</font size>
  
 
A [http://www.projectrhea.org/learning/slectures.php slecture] on [[Cryptography]] by student Divya Agarwal and Katie Marsh.
 
A [http://www.projectrhea.org/learning/slectures.php slecture] on [[Cryptography]] by student Divya Agarwal and Katie Marsh.
Line 13: Line 13:
 
----
 
----
 
----
 
----
==1. Introduction (''Replace by appropriate section title'')==
+
==1. Introduction ==
Text of first section goes here. Here is an example of an equation.
+
DEs as discussed is based on Feistel networks and in Feistel ciphers only the keyschedule has to be modified for decryption.
<math> f(x)= \frac{1}{5} \sin x \int_{-\infty}^\alpha \pi^y dy</math>
+
  
 
----
 
----

Latest revision as of 05:38, 18 June 2015


DES - Decryption

A slecture on Cryptography by student Divya Agarwal and Katie Marsh.

Partly based on the Cryptography Summer 2015 lecture material of Paar.



1. Introduction

DEs as discussed is based on Feistel networks and in Feistel ciphers only the keyschedule has to be modified for decryption.


2. Derivation (Replace by appropriate section title)

Text of second section goes here. Here is an example of a list

  • Blah
  • Blih
  • Bloh
    • Blouh

3. Example (Replace by appropriate section title)

Text of third section goes here. Here is an example of a picture

Nature.jpg


4. Conclusion (Replace by appropriate section title)

Text of fourth section goes here.


5. References

  • Reference 1
  • reference 2


Questions and comments

If you have any questions, comments, etc. please post them here.


Back to 2015 Summer Cryptography Paar


Alumni Liaison

Abstract algebra continues the conceptual developments of linear algebra, on an even grander scale.

Dr. Paul Garrett