RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified. The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified.
The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
Excellent mam.Its really good.
I am From Nagpur Maam these lectures are helping me a lot thank you
tomorrow is your paper ?
@@shikharforwebartister yes and if you have today then all the best
thanks.
@@devashishjaybhaye7258
Thanks, it went OK for me. How was yours?@@devashishjaybhaye7258
it was good @@shikharforwebartister
Change speed to .75 and lesson will be way more relaxed and understandable. 👍🏽
surely you mean 1.75x
idhar 2x kam pad raha hai
we dont hv time brother
Mean while me: got bored of 2x , youtube need to add more than 2x 😂
Really very easy to understand it's very very useful mam..
Thanks a lot 🙏🙏🙏🙏🙏🙏
mam it is really good but why dont you start start data mining
Mam where is your example video for rc4
your explanation is very nice please release all lecture form chapter one up to the last chapter
Mam where is yhe example
mam, your explanation is excellent.💖 But in video description why its mention as Block cipher algorithm?
Mam plz explain RC5 ......
That’s very complicated and lengthy planning to do it in the last
yes mam,explain rc5
Please explain RC5 mam
A question against which I have to XOR the encrypted frame to return the keystream.
Very good
In key scheduling, initially we took j=0 for 1st step but what about j value in 2nd step while i=1. Mam
This is my doubt tooo
What abt RC5 ma’am ? Is it imp for Exam ?
Mam tell about rc5 algorithm
Okay sure
Rc5?
@@TroubleFreevideos rc5
Where is key distribution vdo and example vdo
Thank u ma'am
aapne to badi jaldi padhai start kar di :)
mam you left RC5 algorithm
Nyc explanation
Ma'am explain RC5 algorithm
Mam please make a on RC5
Its too imp as of now because we have exam on 20th of January
Mam can to upload video about RC5 algorithm
Thanku for uploading 😀🙏
Example 🙄
Where is the next video????
thankyo;u ssoo muchDidi apka intro music bohot loud hai
In the second step, shouldn’t the i and j mod operations be 4 (i = (i+1) mod 4) as per your example or is it always 256 (i = (i+1) mod 256)? at 7:18
RC 5 video pls madam
Can u please explain rc5 algorithm
bhai pehle rc4 krle fir puch
is'nt the RC4 a stream cipher?
yep
Ma'am Rc5 algorithm also explain ma'am i hv exam on coming week
Pls explain RC5 mam
why u didnt give the CT answer?
Why so fast..
But RC4 is a stream cipher.
Rc5 please
Mam please explain RC 5 algorithm...
bhai phele RC4 sikhle
Thank u ma'am
Can u explain about rc5 plz