Problem
1. How many permutations are used in a DES cipher algorithm? How many permutations are used in the round-key generator?
2. How many exclusive-or operations are used in the DES cipher?
3. Why does the DES function need an expansion permutation?