DES - Decryption

A slecture on Cryptography by student Divya Agarwal and Katie Marsh.

Partly based on the Cryptography Summer 2015 lecture material of Paar.



1. Introduction

DEs as discussed is based on Feistel networks and in Feistel ciphers only the keyschedule has to be modified for decryption.


2. Derivation (Replace by appropriate section title)

Text of second section goes here. Here is an example of a list

  • Blah
  • Blih
  • Bloh
    • Blouh

3. Example (Replace by appropriate section title)

Text of third section goes here. Here is an example of a picture

Nature.jpg


4. Conclusion (Replace by appropriate section title)

Text of fourth section goes here.


5. References

  • Reference 1
  • reference 2


Questions and comments

If you have any questions, comments, etc. please post them here.


Back to 2015 Summer Cryptography Paar


Alumni Liaison

has a message for current ECE438 students.

Sean Hu, ECE PhD 2009