So far, the only properties of the encryption functions we have been discussing that have been relevant are:
If (as is likely) a message that is not 64-bits long is to be encrypted it must be broken up into 64-bit chunks (and padded with extra bits if necessary). In this case, it is not considered safe to simply apply the encryption process independently to each block. A more complex procedure is used so that each block is encrypted somewhat differently from the proceeding blocks. We will discuss this if time permits.