Feistel Cipher Structure

Поделиться
HTML-код
  • Опубликовано: 22 ноя 2024

Комментарии • 33

  • @swatiravishyam2781
    @swatiravishyam2781 Год назад +22

    And once again, the NESO Academy comes to my rescue for college tests!!. I LOV Ethis channel. i remember watching it a LOT during my 3rd semester for DLD concepts. THANK YOU SO MUCHHH!!!

  • @shashankpandey7273
    @shashankpandey7273 8 месяцев назад +43

    Now I am wondering why my professor's lecture notes and neso lectures are exactly same. 😂😂

    • @aswinmanmathans6837
      @aswinmanmathans6837 7 месяцев назад +4

      😂.. they both refer to the same textbook ,like me (still I used to look into yt😂)

    • @akshayc0
      @akshayc0 5 месяцев назад +1

      same🙂

    • @moakhirul
      @moakhirul 3 месяца назад +1

      Your professor is smart! Why waste time making lecture notes when you can find them free on RUclips.

    • @amogh8237
      @amogh8237 3 месяца назад

      The text books are the same

    • @practistsuhail3371
      @practistsuhail3371 Месяц назад

      Same

  • @magotelecom
    @magotelecom 9 дней назад

    Great explaining you did and thank you very much.

  • @pa32779
    @pa32779 Год назад +8

    Legend, thank you so much! Better than 4 hours of my university lecture and practical!

  • @jordanwilliams1546
    @jordanwilliams1546 Год назад +2

    Thank you very much. I needed to know this for class

  • @moakhirul
    @moakhirul 3 месяца назад +3

    Great video, very nicely made.
    1. I am still confused about the swap in Decryption where LD16 becomes LD17 (and RD16 becomes RD17). Isn't the only purpose of swap to change LD to RD and vice versa. Why LD16 is not becoming RD17. If an element is written on the left of the diagram, why is it still written "RD"17, instead of "LD"17?
    2. Also, if in encryption, the last action was a 32 bit swap, to reverse this during decryption, why is the swap not the first thing to do?

    • @vpm6978
      @vpm6978 21 день назад +2

      I can answer your 2. But I'm also confused with 1. , as you can see we are using only one algorithm for both encoding and deciphering therefore the ciphertext is inputted into the left algorithm with reverse keys like 16,15,...1. and at last we had done swapping process ..

  • @HR13inGermany
    @HR13inGermany Год назад +2

    Thanks, it was helpful

  • @NTxleO337
    @NTxleO337 8 месяцев назад

    sankalchand patel university ke jai hooooo

  • @devmahad
    @devmahad 2 месяца назад

    Thank you :)

  • @lonewalker5025
    @lonewalker5025 10 месяцев назад +15

    where are the examples bro? you just rambled on like my lecturer

    • @ritik84629
      @ritik84629 8 месяцев назад

      RIGHT, WORST EXPLAINATION. JUST READING THE DIAGRAM

    • @roboto06
      @roboto06 Месяц назад

      @@ritik84629 Firstly u should know that its used in DES, so u'll find the example there. 2ndly your'e here becuz your paid teacher can't even make you read this diagram. Go and bark in front of them

  • @johnashok9075
    @johnashok9075 Год назад +1

    tq soo much sir

  • @dhaneshpt8641
    @dhaneshpt8641 Год назад

    Thank you very much..

  • @dotniiko6676
    @dotniiko6676 2 месяца назад +1

    why is the reverse of this algorithm true does any have some example or reference text for the proof?

    • @handsomeman-pm9vy
      @handsomeman-pm9vy 2 месяца назад +1

      Apparently when half of a block is xored with the other half some sort of stream cipher is produced. And in a stream cipher encryption and decryption is the same.

    • @vpm6978
      @vpm6978 21 день назад +1

      I can suggest you cryptography-and-network-security_-principles-and-practice-7th-global-edition book

  • @perioguatexgaming1333
    @perioguatexgaming1333 Год назад

    The Encryption Fig is wrong I guess, The LE1 will be created from RE0 after it passes through F and not Directly.

    • @telsaabi9865
      @telsaabi9865 Год назад +4

      you're wrong , its correct as displayed in the video

  • @TheJayRamKumar
    @TheJayRamKumar Год назад

    sir please upload all network security chapters. I cant afford to purchase

  • @blackdevil3548
    @blackdevil3548 Год назад +1

    Hello
    Can you suggest a one best and simple subject for open electives in BscIt
    I'm very confused..😢

  • @subbusparkz1240
    @subbusparkz1240 11 месяцев назад

    Y only 16 steps in encrypted processs

    • @arpitasutosh9861
      @arpitasutosh9861 7 месяцев назад +2

      It's example.....it doesn't matter it's 16 or not

  • @AIEcho12
    @AIEcho12 8 месяцев назад

    10Q