Go to
slide 10
Key Schedule Criteria
No weak or semi-weak keys
Minimal key complementation weaknesses
Each subkey bit dependent on one key bit
All key bits used equally
No meet-in-the-middle attacks
Immune to related-key cryptanalysis