Table of the Blowfish algorithm will start to set up as a Subkey called P-array and S-box, which contains the value of the hexadecimal value of Pi which are not organized and are difficult to arrange, without this secret key is XORed with P-entries or 32 bit on the left hand side on every round since P1. P16 and every round until there will be Generate every Subkey. When that session, XORed into the work in the function F, which consists of 4 S-box then it will P-entries or XORed with the Block size is 32 Bit Data that is located on the right hand side of the switch by the 32 Bit P-entries right hand and the left switch is 32 Bit P-entries way.The switch to the left to the right, it is an end in each round will be working continuously until the 16th and reached the round of 16 when it will make a a XORed with P-array, 17 and 18, which is the last Subkey, the two end stages and there will be a process of unification of the two sides 32 Bit Block Cipher into a 64 Bit Cipher text size like a Blowfish encryption in the original, which will be run (Run) all the time, to Generate value, 521 of every Subkey that has occurred in which the CPU is 4 KB in size to only the Process very little.
การแปล กรุณารอสักครู่..
