Security(cont’d)
Believed to be effective against other cryptanalysis methods such as variants of DC and LC and algebraic methods
Believed to have no weak keys in the key schedule, no equivalent key pairs
Previous slide
Next slide
Back to first slide
View graphic version