Instead of taking coaching and learning from the universities ,it is better to learn from here......man u are doing great job not only providing us the education for free but also making us understand the concept very easily
Information Security was never this easy, Commendable Job Sir !! PS: If you were my Subject Faculty i would have never missed your lecture Thank you vvvvvvvv muchhhhh 💯💯
Amazing sir my exam is going to be started from next week I was so stressed about this subject but after teaching by you my all doubts are getting cleared tooo gooood sir thanks a lot
Amazing vedios......Amazing explanation.....you hardwork behind the vedios is clearly reflecting in vedios.....An educator is over and above all the creaters
CORRECT: The right half of the Plain Text is not directly passed to the left of the second half it will be: * The Right Half is processed by the Function F(K,R) and passed to the left of the second round. * The Left Half is XORed with the output of Function F(K,R) and passed to the right of the second round Reference: Cryptography and Network Security 7th Edition William Stallings (Page# 126 Figure 4.3)
AES and DES Algorithm, double des and triple des You have not uploaded those videos .....you have created those videos which are not so much important.
I was facing so much difficulty to understand... then I got your video and now it's clear to me. Thank you a lot.
Instead of taking coaching and learning from the universities ,it is better to learn from here......man u are doing great job not only providing us the education for free but also making us understand the concept very easily
Information Security was never this easy, Commendable Job Sir !!
PS: If you were my Subject Faculty i would have never missed your lecture
Thank you vvvvvvvv muchhhhh
💯💯
It is very important to swap the (L and R) to (R and L) for getting ciphertext. And swap (R and L) to (L and R) for getting the plaintext.
Bhai australia me padh ra hun par lecture se pehle aapki classes lagata hun. Great videos!
Sir plz upload video on AES and DES Algorithm
thank you! watching a night before exam! hope to score good marks!
Lockdown ke baadh...padai karne ka mood bas app laa sakta hoo..easy understanding see..🤟🤟🤟👌👌👌👌👍👍👍👍👍
Feistel cypher? Now it become easy, Loved your explanation from Bangladesh
Best way anyone has ever taught..
Amazing sir my exam is going to be started from next week I was so stressed about this subject but after teaching by you my all doubts are getting cleared tooo gooood sir thanks a lot
Bahut aacha se explain kiya aapne..
I'm a regular follower of your videos and trust me there's nothing better if a person can have a clear concept about topic in just 5 min🔥🎉
Sir thodi bahut nai puri tarah se help ho gai.You make things easier!!!!
sir jese ek dost cheezo ko easy krke samjhata h n vese aap samjhate ho
Can't thank you enough, sir.
Life saver.
Allah bless you sir you are a great teacher i have ever seen before....i am totally impressed
Seriously osm teaching sir👏🤩...ak ak consept easily pta chl jata.. great sir.. really helpful your videos for my exam .. thank-you so much 🙏😊🤩
Very Clear and precise explanation . Thanks !
Kya baat hai !!! Perfect Explanation.
1 nunber video sir
Very good explanation I ever seen in UA-cam
Amazing vedios......Amazing explanation.....you hardwork behind the vedios is clearly reflecting in vedios.....An educator is over and above all the creaters
Super awesome Sir......
Dear sir ,you explained very nicely ..respect from pakistan
Tomorrow is my exam. Commenting on this video even before watching this. Full faith and confidence . Ye video bada he kamaal ka hone waala hai xD
Brilliant explanation man, really really helpful.
6:55 Final action is going to be the ulta of initial state. :)
Best way of teaching
bhai acha kya bht acha laga♥
Your explanation is really awesome 👍👍👍
CORRECT: The right half of the Plain Text is not directly passed to the left of the second half it will be:
* The Right Half is processed by the Function F(K,R) and passed to the left of the second round.
* The Left Half is XORed with the output of Function F(K,R) and passed to the right of the second round
Reference: Cryptography and Network Security 7th Edition William Stallings (Page# 126 Figure 4.3)
ur god bhayya keep going
Awsome explanation thank you..... its really helpful... keep going...🔥❤
Fabulous sir ji👏
You make so easy anything !! Thanks so much sir
Thank u so much for helping us sir
Very well explained sir. Thank you!
very nice and helpful video
Bahut badhiya sir
salute for your hard work for us😊😊😊
thanks bhi quiz karwany k liay
Sir please upload video on AES & DES...
Explained well sir!!!
Great tutorial as always! Merci 🙏🏻
So much helpful sir!!!!
Your explanation is amazing...
Please upload videos on distributed file system...
sir thank you for the video, its very helpful
awesome explanation
Sir please upload video on AES and DES algo
brilliant work!
Good one.Thanks
nice explanation love from nepal
God bless you sir
Gfeistel cipher ke decryption wali video bhi upload kr dein
nice explanation
Well done
Thank you ❤️
Iska agr reverse kry mtlb decryption kry tb ksy function perform ho ga L py ya again R py hi ho ga?
How will we dicide that this is going to be n's final value?
Like where should we stop?
Professor teaches for an entire semester.
UA-camr in 8 mins: I am gonna end this man's whole career!
Kudos 4 u
Ossm sir tommorow is my exam nd I m refering your video nd they loving the way you explain each topic of cryptography..
Thank you sir!!!
How many rounds have to be performed? What functions are used in each rounds?
for round 2 what will be the value of r, the XOR of l and f(k1,r) or the very divided one?
thank you sir!
:)
this is a symmetric crypt.(used only 1 key)
but u r using k1,k2,.....
excellent explanation
I really appreciate the work. sir can you please tell me how do you record the videos
Simply just using a Smart Phone.
Fiestal me kitny rounds apply kerty?
Thanku so much sir.
100Th Comment Completed 🎉
can you please solve a question using feisel cipher
Thank you so much
A very thank you sir
Sir f(k,r) me kon sa operation perform hoga???
Sir please upload DES and AES Algorithm.
Thank you sir
ser pls round function ko explain kr dijiye
AES and DES please
practical smja dety to acha ho jata
Nice sir
It is translation and substitution
Sir can we written this in exam?
Allah bless you sir
Sir feistel cipher m left half portion m XOR perform krte h, toh right half portion m kyon nhi.
And right half portion m function perform krte h, toh left half portion m kyon nhi.
@@veedfacts-4u koi bhi ek side krna hota hai .............agr dono m ek sath nhi hoskta kyoki F(K,R) ek side he hoskta hai
What is difference between des and feistel algorithm structure diagram
very nice
Super explanation 👍
And how to decrypt this.?
❤
thanks mate
what is xor? 4:44
Kya gunda banega re tu
Bruh how did u reach 7th sem of college without knowing what is XOR 😂
@@UA-camPremium-uf4gdfr 😂
XOR gate .. AND,OR,NOT,NOR,XOR etc etc 😅
sir in mumbai university computer eng sem 6 cryptography and system security subject so please cover that topic also
AES and DES algorithms please
sir decryption part????????
AES and DES Algorithm, double des and triple des You have not uploaded those videos .....you have created those videos which are not so much important.
thanks
What is F
sir kindly koi example dy asy smjh ni aya
Supr
Tnq sir