Tags: crypto des 

Rating: 0

Since the key and the number of iteration are known, we simply need to build a decryption function to which we will give the ciphertext.