Introduction - If you have any usage issues, please Google them yourself
Can be used for a number of binary encryption and decryption of DES algorithm, using the example given in the main function, the user can compare and understand the avalanche effect of DES.