Feistel Cipher Structure

Поділитися
Вставка
  • Опубліковано 16 лис 2024

КОМЕНТАРІ • 33

  • @swatiravishyam2781
    @swatiravishyam2781 Рік тому +22

    And once again, the NESO Academy comes to my rescue for college tests!!. I LOV Ethis channel. i remember watching it a LOT during my 3rd semester for DLD concepts. THANK YOU SO MUCHHH!!!

  • @shashankpandey7273
    @shashankpandey7273 8 місяців тому +43

    Now I am wondering why my professor's lecture notes and neso lectures are exactly same. 😂😂

    • @aswinmanmathans6837
      @aswinmanmathans6837 7 місяців тому +4

      😂.. they both refer to the same textbook ,like me (still I used to look into yt😂)

    • @akshayc0
      @akshayc0 5 місяців тому +1

      same🙂

    • @moakhirul
      @moakhirul 3 місяці тому +1

      Your professor is smart! Why waste time making lecture notes when you can find them free on UA-cam.

    • @amogh8237
      @amogh8237 3 місяці тому

      The text books are the same

    • @practistsuhail3371
      @practistsuhail3371 26 днів тому

      Same

  • @magotelecom
    @magotelecom 4 дні тому

    Great explaining you did and thank you very much.

  • @pa32779
    @pa32779 Рік тому +8

    Legend, thank you so much! Better than 4 hours of my university lecture and practical!

  • @jordanwilliams1546
    @jordanwilliams1546 Рік тому +2

    Thank you very much. I needed to know this for class

  • @moakhirul
    @moakhirul 3 місяці тому +3

    Great video, very nicely made.
    1. I am still confused about the swap in Decryption where LD16 becomes LD17 (and RD16 becomes RD17). Isn't the only purpose of swap to change LD to RD and vice versa. Why LD16 is not becoming RD17. If an element is written on the left of the diagram, why is it still written "RD"17, instead of "LD"17?
    2. Also, if in encryption, the last action was a 32 bit swap, to reverse this during decryption, why is the swap not the first thing to do?

    • @vpm6978
      @vpm6978 16 днів тому +2

      I can answer your 2. But I'm also confused with 1. , as you can see we are using only one algorithm for both encoding and deciphering therefore the ciphertext is inputted into the left algorithm with reverse keys like 16,15,...1. and at last we had done swapping process ..

  • @HR13inGermany
    @HR13inGermany Рік тому +2

    Thanks, it was helpful

  • @johnashok9075
    @johnashok9075 Рік тому +1

    tq soo much sir

  • @devmahad
    @devmahad Місяць тому

    Thank you :)

  • @NTxleO337
    @NTxleO337 8 місяців тому

    sankalchand patel university ke jai hooooo

  • @dhaneshpt8641
    @dhaneshpt8641 Рік тому

    Thank you very much..

  • @lonewalker5025
    @lonewalker5025 10 місяців тому +15

    where are the examples bro? you just rambled on like my lecturer

    • @ritik84629
      @ritik84629 8 місяців тому

      RIGHT, WORST EXPLAINATION. JUST READING THE DIAGRAM

    • @roboto06
      @roboto06 Місяць тому

      @@ritik84629 Firstly u should know that its used in DES, so u'll find the example there. 2ndly your'e here becuz your paid teacher can't even make you read this diagram. Go and bark in front of them

  • @perioguatexgaming1333
    @perioguatexgaming1333 Рік тому

    The Encryption Fig is wrong I guess, The LE1 will be created from RE0 after it passes through F and not Directly.

    • @telsaabi9865
      @telsaabi9865 Рік тому +4

      you're wrong , its correct as displayed in the video

  • @dotniiko6676
    @dotniiko6676 2 місяці тому +1

    why is the reverse of this algorithm true does any have some example or reference text for the proof?

    • @handsomeman-pm9vy
      @handsomeman-pm9vy 2 місяці тому +1

      Apparently when half of a block is xored with the other half some sort of stream cipher is produced. And in a stream cipher encryption and decryption is the same.

    • @vpm6978
      @vpm6978 16 днів тому +1

      I can suggest you cryptography-and-network-security_-principles-and-practice-7th-global-edition book

  • @TheJayRamKumar
    @TheJayRamKumar Рік тому

    sir please upload all network security chapters. I cant afford to purchase

  • @blackdevil3548
    @blackdevil3548 Рік тому +1

    Hello
    Can you suggest a one best and simple subject for open electives in BscIt
    I'm very confused..😢

  • @subbusparkz1240
    @subbusparkz1240 11 місяців тому

    Y only 16 steps in encrypted processs

    • @arpitasutosh9861
      @arpitasutosh9861 7 місяців тому +2

      It's example.....it doesn't matter it's 16 or not

  • @AIEcho12
    @AIEcho12 8 місяців тому

    10Q