6.2 Can you suggest a security improvement to either option in Figure 6.10, using only three DES chips and some number of XOR functions? Assume you are still limited to two keys.
 
 
View Solution
 
 
 
<< Back Next >>