Go to slide 15
Keyed Permutation
- Inspired by Unix crypt(3) DES variant
- Fast and easy to implement in both software and hardware
- Removes key complementation weaknesses
- Dynamically alters path of bits, making differential
and linear cryptanalysis more difficult