include odd parity, for use within the DES routines. If any of the keys
are weak or semi-weak, they are strengthened by eXclusive-ORing the
questionable key with the constant 00000000000000F0. The three DES keys
-are then used to encrypt themselves in 3-DES CBC mode. This result is
-once again encrypted using the same keys and key schedule, and the
-result is parity adjusted. If the final result yields weak or semi-weak
-keys, they are also strengthened in the same manner as the input keys.
+are then used to encrypt themselves in 3-DES CBC mode with a zero
+initial vector. This result is once again encrypted using the same keys
+and key schedule and an initial vector of the last eight octets. The
+result is then parity adjusted. If the final result yields weak or
+semi-weak keys, they are also strengthened in the same manner as the
+input keys.
The n-fold operation used by the string-to-key algorithm
replicates the input bit array X until its length is the least common