Research Article
Two-Key Dependent Permutation for Use in Symmetric Cryptographic System
Table 6
Initial position of bits of binary block for the message
.
| B1 | 0 | B2 | 1 | B3 | 1 | B4 | 0 | B5 | 0 | B6 | 0 | B7 | 0 | B8 | 1 | B9 | 0 | B10 | 1 | B11 | 1 | B12 | 0 | B13 | 0 | B14 | 0 | B15 | 1 | B16 | 0 | B17 | 0 | B18 | 1 | B19 | 1 | B20 | 0 | B21 | 0 | B22 | 0 | B23 | 1 | B24 | 1 | B25 | 0 | B26 | 1 | B27 | 1 | B28 | 0 | B29 | 0 | B30 | 1 | B31 | 0 | B32 | 0 | B33 | 0 | B34 | 1 | B35 | 1 | B36 | 0 | B37 | 0 | B38 | 1 | B39 | 0 | B40 | 1 | B41 | 0 | B42 | 1 | B43 | 1 | B44 | 0 | B45 | 0 | B46 | 1 | B47 | 1 | B48 | 0 | B49 | 0 | B50 | 1 | B51 | 1 | B52 | 0 | B53 | 0 | B54 | 1 | B55 | 1 | B56 | 1 | B57 | 0 | B58 | 1 | B59 | 1 | B60 | 0 | B61 | 1 | B62 | 0 | B63 | 0 | B64 | 0 |
|
|