mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-19 15:14:18 +01:00
Update re102_section4.md
This commit is contained in:
@@ -60,7 +60,7 @@ Cryptographic algorithms are often grouped into two major categories: symmetric
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now let’s look at sub_45B5AC.
|
For every subkey K in this algorithm, it has to loop through each K to XOR and Swap. In the disassembly you will be able to see this looping, incrementing, and swapping action going on. Now let’s look at `sub_45B5AC`.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user