For the key is Weak Key and Weak S-box will be made by fixing odd number to a random number 1 in 214, and the attacks only need 24r + 1 of plaintext to be made for the value of P. -array out and made aware of the value of the S-box with the knowledge of the S-box, you will be able to retrace the source data. And running by this attack can reduce cycle down. And it would have the same information 16 times.
การแปล กรุณารอสักครู่..
