RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified. The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
mam it is really good but why dont you start start data mining
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified.
The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
I am From Nagpur Maam these lectures are helping me a lot thank you
tomorrow is your paper ?
@@shikharforwebartister yes and if you have today then all the best
thanks.
@@devashishjaybhaye7258
Thanks, it went OK for me. How was yours?@@devashishjaybhaye7258
it was good @@shikharforwebartister
Excellent mam.Its really good.
Really very easy to understand it's very very useful mam..
Thanks a lot 🙏🙏🙏🙏🙏🙏
Change speed to .75 and lesson will be way more relaxed and understandable. 👍🏽
surely you mean 1.75x
idhar 2x kam pad raha hai
we dont hv time brother
Mean while me: got bored of 2x , youtube need to add more than 2x 😂
Mam where is your example video for rc4
your explanation is very nice please release all lecture form chapter one up to the last chapter
Mam plz explain RC5 ......
That’s very complicated and lengthy planning to do it in the last
yes mam,explain rc5
Please explain RC5 mam
mam, your explanation is excellent.💖 But in video description why its mention as Block cipher algorithm?
In key scheduling, initially we took j=0 for 1st step but what about j value in 2nd step while i=1. Mam
This is my doubt tooo
A question against which I have to XOR the encrypted frame to return the keystream.
What abt RC5 ma’am ? Is it imp for Exam ?
Mam where is yhe example
mam you left RC5 algorithm
thankyo;u ssoo muchDidi apka intro music bohot loud hai
Mam please make a on RC5
Its too imp as of now because we have exam on 20th of January
Nyc explanation
Where is key distribution vdo and example vdo
Mam can to upload video about RC5 algorithm
Ma'am Rc5 algorithm also explain ma'am i hv exam on coming week
In the second step, shouldn’t the i and j mod operations be 4 (i = (i+1) mod 4) as per your example or is it always 256 (i = (i+1) mod 256)? at 7:18
Thanku for uploading 😀🙏
Mam tell about rc5 algorithm
Okay sure
Rc5?
@@TroubleFreevideos rc5
is'nt the RC4 a stream cipher?
yep
why u didnt give the CT answer?
Why so fast..
Can u please explain rc5 algorithm
bhai pehle rc4 krle fir puch
Very good
Ma'am explain RC5 algorithm
Where is the next video????
Example 🙄
But RC4 is a stream cipher.
Pls explain RC5 mam
RC 5 video pls madam
Thank u ma'am
aapne to badi jaldi padhai start kar di :)
Rc5 please
I love you
Mam please explain RC 5 algorithm...
bhai phele RC4 sikhle
Can u explain about rc5 plz
Thank u ma'am