chapter 3
chapter 3
• Repeat all of the steps seven times, using K(7) through K(12) the second time,
up to K(43) through K(48) the eighth time. Note that the swap of B and C is not
performed after round 8.
• Then in the ninth round multiply A by K(49). Add K(50) to B. Add K(51) to C.
Multiply D by K(52).
Dr. Benita Jaison, MCA Dept., St. Francis College.
Subkey generation
• The 128-bit key of IDEA is taken as the first eight
subkeys, K(1) through K(8).
• The next eight subkeys are obtained the same
way, after a 25-bit circular left shift, and this is
repeated until all encryption subkeys are derived.
• This method of subkey generation is regular, and
this may be a weakness.
• IDEA is considered to be highly secure, having
stood up to all forms of attack so far tried by the
academic community.
•