Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key(Km1)and a rotation key (Kr1) for performing its functions. What is the algorithm employed by Harper to secure the email messages?
Shala
17 days agoLavera
8 days agoTamar
28 days agoClaribel
29 days agoCoral
1 months agoBrice
2 days agoElmer
2 months agoCordell
8 days agoCarey
9 days agoShelia
10 days agoBrittni
13 days agoRonnie
15 days agoLucina
22 days agoBelen
1 months agoChandra
2 months agoKenneth
2 months agoKing
2 months agoBobbye
2 months ago