The original secret key is used for round subkey generation. Its value forms first round subkeys: K1 consists of its senior bits and K2 consists of its junior bits. Feistel scheme is applied for computation of each subsequent key pair as shown in Fig. 5.