Matching of such two encryption procedures with the lag of two rounds is shown in Fig. 10. In this case we consider that the second plain text is the output of the second round of the original plain text encryption. The original plain text (XL,XR) and the second plain text (XL1,XR1) are bound by the following conditions: