This is a dedicated watch page for a single video.
Mia, a software engineer, is working on the development of an email application. To ensure the confidentiality of email messages, Mia opts for a symmetric-key block cipher with a classical 12- or 16-round Feistel network. The cipher has a block size of 64 bits and incorporates large 8 × 32-bit S-boxes (S1, S2, S3, S4) based on bent functions. It utilizes modular addition and subtraction, key-dependent rotation, and XOR operations in its encryption process. Additionally, the cipher includes a masking key (Km1) and a rotation key (Kr1) to perform its functions. What is the algorithm implemented by Mia to safeguard the email messages?