Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key(Km1)and a rotation key (Kr1) for performing its functions. What is the algorithm employed by Harper to secure the email messages?
Shala
8 days agoTamar
19 days agoClaribel
20 days agoCoral
22 days agoElmer
2 months agoCarey
Shelia
23 hours agoBrittni
4 days agoRonnie
5 days agoLucina
13 days agoBelen
1 months agoChandra
1 months agoKenneth
2 months agoKing
2 months agoBobbye
2 months ago