January 22, 2002
Practical Aspects of Modern Cryptography
25
Feistel Ciphers
nTypically, most Feistel ciphers are iterated for about 16 rounds.
nDifferent “sub-keys” are used for each round.
nSub-keys are derived from the master key or a derived key schedule
nEven a weak round function can yield a strong Feistel cipher if iterated sufficiently.