Feistel Cipher Structure

Поділитися
Вставка
  • Опубліковано 21 гру 2024

КОМЕНТАРІ • 33

  • @swatiravishyam2781
    @swatiravishyam2781 Рік тому +23

    And once again, the NESO Academy comes to my rescue for college tests!!. I LOV Ethis channel. i remember watching it a LOT during my 3rd semester for DLD concepts. THANK YOU SO MUCHHH!!!

  • @shashankpandey7273
    @shashankpandey7273 9 місяців тому +48

    Now I am wondering why my professor's lecture notes and neso lectures are exactly same. 😂😂

    • @aswinmanmathans6837
      @aswinmanmathans6837 8 місяців тому +5

      😂.. they both refer to the same textbook ,like me (still I used to look into yt😂)

    • @akshayc0
      @akshayc0 6 місяців тому +1

      same🙂

    • @moakhirul
      @moakhirul 4 місяці тому +1

      Your professor is smart! Why waste time making lecture notes when you can find them free on UA-cam.

    • @amogh8237
      @amogh8237 4 місяці тому

      The text books are the same

    • @practistsuhail3371
      @practistsuhail3371 2 місяці тому

      Same

  • @magotelecom
    @magotelecom Місяць тому

    Great explaining you did and thank you very much.

  • @pa32779
    @pa32779 Рік тому +8

    Legend, thank you so much! Better than 4 hours of my university lecture and practical!

  • @jordanwilliams1546
    @jordanwilliams1546 Рік тому +2

    Thank you very much. I needed to know this for class

  • @HR13inGermany
    @HR13inGermany Рік тому +2

    Thanks, it was helpful

  • @moakhirul
    @moakhirul 4 місяці тому +3

    Great video, very nicely made.
    1. I am still confused about the swap in Decryption where LD16 becomes LD17 (and RD16 becomes RD17). Isn't the only purpose of swap to change LD to RD and vice versa. Why LD16 is not becoming RD17. If an element is written on the left of the diagram, why is it still written "RD"17, instead of "LD"17?
    2. Also, if in encryption, the last action was a 32 bit swap, to reverse this during decryption, why is the swap not the first thing to do?

    • @vpm6978
      @vpm6978 Місяць тому +2

      I can answer your 2. But I'm also confused with 1. , as you can see we are using only one algorithm for both encoding and deciphering therefore the ciphertext is inputted into the left algorithm with reverse keys like 16,15,...1. and at last we had done swapping process ..

  • @dotniiko6676
    @dotniiko6676 3 місяці тому +1

    why is the reverse of this algorithm true does any have some example or reference text for the proof?

    • @handsomeman-pm9vy
      @handsomeman-pm9vy 3 місяці тому +1

      Apparently when half of a block is xored with the other half some sort of stream cipher is produced. And in a stream cipher encryption and decryption is the same.

    • @vpm6978
      @vpm6978 Місяць тому +1

      I can suggest you cryptography-and-network-security_-principles-and-practice-7th-global-edition book

  • @dhaneshpt8641
    @dhaneshpt8641 Рік тому

    Thank you very much..

  • @devmahad
    @devmahad 3 місяці тому

    Thank you :)

  • @johnashok9075
    @johnashok9075 Рік тому +1

    tq soo much sir

  • @NTxleO337
    @NTxleO337 9 місяців тому

    sankalchand patel university ke jai hooooo

  • @perioguatexgaming1333
    @perioguatexgaming1333 Рік тому

    The Encryption Fig is wrong I guess, The LE1 will be created from RE0 after it passes through F and not Directly.

    • @telsaabi9865
      @telsaabi9865 Рік тому +4

      you're wrong , its correct as displayed in the video

  • @lonewalker5025
    @lonewalker5025 11 місяців тому +17

    where are the examples bro? you just rambled on like my lecturer

    • @ritik84629
      @ritik84629 9 місяців тому

      RIGHT, WORST EXPLAINATION. JUST READING THE DIAGRAM

    • @roboto06
      @roboto06 2 місяці тому

      @@ritik84629 Firstly u should know that its used in DES, so u'll find the example there. 2ndly your'e here becuz your paid teacher can't even make you read this diagram. Go and bark in front of them

  • @subbusparkz1240
    @subbusparkz1240 Рік тому

    Y only 16 steps in encrypted processs

    • @arpitasutosh9861
      @arpitasutosh9861 8 місяців тому +2

      It's example.....it doesn't matter it's 16 or not

  • @TheJayRamKumar
    @TheJayRamKumar Рік тому

    sir please upload all network security chapters. I cant afford to purchase

  • @blackdevil3548
    @blackdevil3548 Рік тому +1

    Hello
    Can you suggest a one best and simple subject for open electives in BscIt
    I'm very confused..😢

  • @AIEcho12
    @AIEcho12 9 місяців тому

    10Q