Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key(Km1)and a rotation key (Kr1) for performing its functions. What is the algorithm employed by Harper to secure the email messages?
Jody
4 months agoJaclyn
4 months agoRonna
4 months agoAnnmarie
4 months agoBrice
5 months agoSang
5 months agoHerminia
5 months agoPearlie
5 months agoElfrieda
6 months agoFelton
6 months agoHildegarde
6 months agoEttie
6 months agoMing
6 months agoShala
11 months agoElly
9 months agoLeatha
10 months agoLavera
10 months agoTamar
11 months agoClaribel
11 months agoCoral
11 months agoVannessa
10 months agoLeanora
10 months agoBrice
10 months agoElmer
1 year agoCordell
10 months agoCarey
10 months agoShelia
10 months agoBrittni
10 months agoRonnie
11 months agoLucina
11 months agoBelen
11 months agoChandra
12 months agoKenneth
1 year agoKing
1 year agoBobbye
1 year ago