Table of Contents
FROG Encryption Standard Introduction
High Level View of FROG
FROG Key
Four Basic Operation on Each iteration (Confusion)
Four Basic Operations on Each Iteration (Diffusion)
One Iteration of FROG Encryption
One Iteration of FROG Decryption
FROG Key Setup
Formatting the internal Key
Diffusion (BombPermu)Restriction
Maximum Cycle Algorithm
Performance on Pentium PlatformProgram: ANSI C optimized versionPlatform: Pentium 200MH PC, 64M PAM, Win95
Performance on a 8-bit computerProgram: Z80 Assembly for internal cyclePlatform: 2.5MH Z80, 64KB memory running under CP/M
Security
Fault Tolerance
|
Author: clusters
|