# Feistel Cipher in Cryptography

In this article, we will learn about the **Feistel Cipher** which is the structure used to create block cipher. Here, we will be studying the Feistel structure first, then about where this structure is implemented and finally, how the encryption of the data is done in the **Feistel Cipher technique**?

Submitted by Monika Sharma, on January 08, 2020

The **Feistel Cipher** is a structure used to create block ciphers. It has many rounds of encryption to increase security. In each round, different techniques are applied to the plain text to encrypt it. Each round has one substitution technique. The plain text after passing through all these rounds gets converted into the Ciphertext. The complete process of the encryption is explained as follows,

### The Feistel Cipher encryption process

The process of encryption **Feistel Cipher** takes place as follows,

- In this Cipher, the plain text is divided into two equal parts. The left part is denoted as L and the Right part is denoted as R.
- Every round has an encryption function that is applied to the plain text. (It is applied only to one of the two divisions of the plain text, that is to the left one.)
- The encryption function is applied on the left part of the plain text and the right part goes unchanged in every round.
- The encryption function has two parameters: Encryption key and Right part of the plain text.
- XOR operation is performed between the Left part and the encryption function.
- The Right part becomes the Left part of the next round and the output of the XOR operation becomes the Right part of the next round. It means that the substituted right part and unchanged right part are swapped for the next round.
- Each round has a different encryption key or we can say that the key is round dependent, i.e. the key for every round is generated in advance.
- The process shown above is of a single round. The number of rounds depends upon the algorithm of the process.

The difficult part of this algorithm is designing the round function because it must be applied in every round until the final ciphertext is received. The more the number of rounds, the more secure the data becomes.

The process of one round is shown in the diagram

**The decryption process of Feistel Cipher is given below,**

The decryption process of **Feistel Cipher** is almost the same as the encryption process. Just like we entered the plain text in the Feistel block, we have to do the same with the ciphertext. The ciphertext will be divided into two parts just like the plain text. The only difference is that the keys will be used in reverse order.

**Number of rounds:**

The number of rounds depends upon how much security you want. Security is directly proportional to the number of rounds. But simultaneously it slows down the speed of encryption and decryption. The larger the number of rounds is, the creation of ciphertext from plain text and plain text from ciphertext will be slow.

TOP Interview Coding Problems/Challenges

- Run-length encoding (find/print frequency of letters in a string)
- Sort an array of 0's, 1's and 2's in linear time complexity
- Checking Anagrams (check whether two string is anagrams or not)
- Relative sorting algorithm
- Finding subarray with given sum
- Find the level in a binary tree with given sum K
- Check whether a Binary Tree is BST (Binary Search Tree) or not
- 1[0]1 Pattern Count
- Capitalize first and last letter of each word in a line
- Print vertical sum of a binary tree
- Print Boundary Sum of a Binary Tree
- Reverse a single linked list
- Greedy Strategy to solve major algorithm problems
- Job sequencing problem
- Root to leaf Path Sum
- Exit Point in a Matrix
- Find length of loop in a linked list
- Toppers of Class
- Print All Nodes that don't have Sibling
- Transform to Sum Tree
- Shortest Source to Destination Path

Comments and Discussions

**Ad:**
Are you a blogger? Join our Blogging forum.