05.08.2014 Views

Lecture Notes for Computer Architecture II - St. Cloud State University

Lecture Notes for Computer Architecture II - St. Cloud State University

Lecture Notes for Computer Architecture II - St. Cloud State University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1. Following pseudo code represents BlowFish decryption algorithm used in<br />

cryptographic applications.<br />

For i =1 to 16 do<br />

RDi = LDi-1 P19-i;<br />

LDi = F[RDi] RDi-1;<br />

LD17 = RD16 P1;<br />

RD17 = LD16 P12;<br />

Page | 115<br />

Where<br />

REi and LEi refer to the 32-bit right half and 32-bit left half of the data after round i has<br />

completed.<br />

Pi represents the 32 bit sub key used at stage i.<br />

The 32-bit input to function F is divided into 4 bytes a, b, c and d. Then the function F is<br />

defined as F(a, b, c, d) = ((S1,a + S2,b) S3,c) + S4,d . Each S-box, S1,a , S2,b ,<br />

S3,c,and S4,d generates 32-bit output from 8-bit input.<br />

Draw the hardware organization <strong>for</strong> this special purpose algorithm.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!