A Case Study of Key-Dependent Permutations in Feistel Ciphers