6.2 Can you suggest a security improvement to either option in Figure 6.12, using only three DES chips and some number of XOR functions? Assume you are still limited to two keys.

 
 
View Solution
 
 
 
<< Back Next >>