This cipher uses a key-dependent permutation and a nonlinear feedback function to generate a stream of pseudo-random bits that are used to encrypt and decrypt data.
This cipher uses a key-dependent permutation and a nonlinear feedback function to generate a stream of pseudo-random bits that are used to encrypt and decrypt data.