RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified. The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified.
The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
mam it is really good but why dont you start start data mining
Excellent mam.Its really good.
your explanation is very nice please release all lecture form chapter one up to the last chapter
Change speed to .75 and lesson will be way more relaxed and understandable. 👍🏽
surely you mean 1.75x
idhar 2x kam pad raha hai
we dont hv time brother
Mean while me: got bored of 2x , youtube need to add more than 2x 😂
Mam plz explain RC5 ......
That’s very complicated and lengthy planning to do it in the last
yes mam,explain rc5
Please explain RC5 mam
What abt RC5 ma’am ? Is it imp for Exam ?
I am From Nagpur Maam these lectures are helping me a lot thank you
tomorrow is your paper ?
@@shikharforwebartister yes and if you have today then all the best
thanks.
@@devashishjaybhaye7258
Thanks, it went OK for me. How was yours?@@devashishjaybhaye7258
it was good @@shikharforwebartister
Mam where is your example video for rc4
Really very easy to understand it's very very useful mam..
Thanks a lot 🙏🙏🙏🙏🙏🙏
mam you left RC5 algorithm
Mam where is yhe example
mam, your explanation is excellent.💖 But in video description why its mention as Block cipher algorithm?
Mam please make a on RC5
Its too imp as of now because we have exam on 20th of January
Nyc explanation
A question against which I have to XOR the encrypted frame to return the keystream.
In key scheduling, initially we took j=0 for 1st step but what about j value in 2nd step while i=1. Mam
This is my doubt tooo
Very good
Where is key distribution vdo and example vdo
Thanku for uploading 😀🙏
Mam tell about rc5 algorithm
Okay sure
Rc5?
@@TroubleFreevideos rc5
Ma'am explain RC5 algorithm
Mam can to upload video about RC5 algorithm
Ma'am Rc5 algorithm also explain ma'am i hv exam on coming week
Thank u ma'am
aapne to badi jaldi padhai start kar di :)
Example 🙄
thankyo;u ssoo muchDidi apka intro music bohot loud hai
In the second step, shouldn’t the i and j mod operations be 4 (i = (i+1) mod 4) as per your example or is it always 256 (i = (i+1) mod 256)? at 7:18
is'nt the RC4 a stream cipher?
yep
But RC4 is a stream cipher.
Can u please explain rc5 algorithm
bhai pehle rc4 krle fir puch
why u didnt give the CT answer?
Why so fast..
Pls explain RC5 mam
RC 5 video pls madam
Where is the next video????
Rc5 please
Mam please explain RC 5 algorithm...
bhai phele RC4 sikhle
Thank u ma'am
Can u explain about rc5 plz