Research Article

Two-Key Dependent Permutation for Use in Symmetric Cryptographic System

Figure 2

Binary representation of the message .