FROG Encryption Standard Introduction

4/7/99


Click here to start


Table of Contents

FROG Encryption Standard Introduction

High Level View of FROG

FROG Key

Four Basic Operation on Each iteration (Confusion)

Four Basic Operations on Each Iteration (Diffusion)

One Iteration of FROG Encryption

One Iteration of FROG Decryption

FROG Key Setup

Formatting the internal Key

Diffusion (BombPermu)Restriction

Maximum Cycle Algorithm

Performance on Pentium Platform Program: ANSI C optimized version Platform: Pentium 200MH PC, 64M PAM, Win95

Performance on a 8-bit computer Program: Z80 Assembly for internal cycle Platform: 2.5MH Z80, 64KB memory running under CP/M

Security

Fault Tolerance

Author: clusters