Тёмный

Feistel Cipher Structure 

Neso Academy
Подписаться 2,7 млн
Просмотров 161 тыс.
50% 1

Опубликовано:

 

14 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 28   
@swatiravishyam2781
@swatiravishyam2781 Год назад
And once again, the NESO Academy comes to my rescue for college tests!!. I LOV Ethis channel. i remember watching it a LOT during my 3rd semester for DLD concepts. THANK YOU SO MUCHHH!!!
@shashankpandey7273
@shashankpandey7273 6 месяцев назад
Now I am wondering why my professor's lecture notes and neso lectures are exactly same. 😂😂
@aswinmanmathans6837
@aswinmanmathans6837 6 месяцев назад
😂.. they both refer to the same textbook ,like me (still I used to look into yt😂)
@akshayc0
@akshayc0 4 месяца назад
same🙂
@moakhirul
@moakhirul 2 месяца назад
Your professor is smart! Why waste time making lecture notes when you can find them free on RU-vid.
@amogh8237
@amogh8237 2 месяца назад
The text books are the same
@moakhirul
@moakhirul 2 месяца назад
Great video, very nicely made. 1. I am still confused about the swap in Decryption where LD16 becomes LD17 (and RD16 becomes RD17). Isn't the only purpose of swap to change LD to RD and vice versa. Why LD16 is not becoming RD17. If an element is written on the left of the diagram, why is it still written "RD"17, instead of "LD"17? 2. Also, if in encryption, the last action was a 32 bit swap, to reverse this during decryption, why is the swap not the first thing to do?
@pa32779
@pa32779 Год назад
Legend, thank you so much! Better than 4 hours of my university lecture and practical!
@jordanwilliams1546
@jordanwilliams1546 11 месяцев назад
Thank you very much. I needed to know this for class
@dotniiko6676
@dotniiko6676 Месяц назад
why is the reverse of this algorithm true does any have some example or reference text for the proof?
@handsomeman-pm9vy
@handsomeman-pm9vy Месяц назад
Apparently when half of a block is xored with the other half some sort of stream cipher is produced. And in a stream cipher encryption and decryption is the same.
@HR13inGermany
@HR13inGermany Год назад
Thanks, it was helpful
@devmahad
@devmahad 24 дня назад
Thank you :)
@perioguatexgaming1333
@perioguatexgaming1333 Год назад
The Encryption Fig is wrong I guess, The LE1 will be created from RE0 after it passes through F and not Directly.
@telsaabi9865
@telsaabi9865 Год назад
you're wrong , its correct as displayed in the video
@johnashok9075
@johnashok9075 Год назад
tq soo much sir
@lonewalker5025
@lonewalker5025 8 месяцев назад
where are the examples bro? you just rambled on like my lecturer
@ritik84629
@ritik84629 7 месяцев назад
RIGHT, WORST EXPLAINATION. JUST READING THE DIAGRAM
@dhaneshpt8641
@dhaneshpt8641 Год назад
Thank you very much..
@blackdevil3548
@blackdevil3548 Год назад
Hello Can you suggest a one best and simple subject for open electives in BscIt I'm very confused..😢
@sandhyabhattarai1750
@sandhyabhattarai1750 Год назад
Multimedia
@TheJayRamKumar
@TheJayRamKumar Год назад
sir please upload all network security chapters. I cant afford to purchase
@NTxleO337
@NTxleO337 7 месяцев назад
sankalchand patel university ke jai hooooo
@subbusparkz1240
@subbusparkz1240 10 месяцев назад
Y only 16 steps in encrypted processs
@arpitasutosh9861
@arpitasutosh9861 6 месяцев назад
It's example.....it doesn't matter it's 16 or not
@AIEcho12
@AIEcho12 7 месяцев назад
10Q