KEY SCHEDULE
Round keys extracted from the cipher key in two steps
- Initial key expansion
- First bits of the expanded key are set to the bits of the cipher key
- Remaining bits calculated recursively as a non-linear function of the previous bits of the expanded key
- Round key selection from expanded key