This five step procedure is referred to as the Feistel function after its originator.
- CHAPTER 2: Protecting Against Eavesdroppers with Symmetric Cryptography
- from Implementing SSL/TLS Using Cryptography and PKI
- Publisher: John Wiley & Sons
- Released: January 2011
with respect to diagram, that would be first 4 steps not 5 though.
Share this highlighthttp://www.safaribooksonline.com/a/implementing-ssltls-using/263567/