The hash can be implemented in numerous ways, though most often uses a permutation table or a bit manipulation scheme.
2.
The chosen key schedule produces a total of 8 " permutation tables ", each a permutation of the numbers 0 to 255.
3.
The permutation table " "'p " "'applies a permutation to each digit based on its position in the number.
4.
The permutation tables stay the same through all rounds of encryption on a given block, but if control bit 5 is set, then the tables are regenerated after each block.
5.
Each round consists of 4 operations : XORing the block with one of the permutation tables, " shredding " or permuting individual bits throughout the block, an unkeyed S-boxes.