... register
1
Mapping the encryption or decryption key to the Key register is straightforward, bytes
of the key are mapped one to one to bytes
of the Key register respectively.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .