No video

Feistel Cipher Structure

  Рет қаралды 129,848

Neso Academy

Neso Academy

Күн бұрын

Пікірлер: 25
@swatiravishyam2781
@swatiravishyam2781 9 ай бұрын
And once again, the NESO Academy comes to my rescue for college tests!!. I LOV Ethis channel. i remember watching it a LOT during my 3rd semester for DLD concepts. THANK YOU SO MUCHHH!!!
@jordanwilliams1546
@jordanwilliams1546 9 ай бұрын
Thank you very much. I needed to know this for class
@HR13inGermany
@HR13inGermany 11 ай бұрын
Thanks, it was helpful
@pa32779
@pa32779 11 ай бұрын
Legend, thank you so much! Better than 4 hours of my university lecture and practical!
@shashankpandey7273
@shashankpandey7273 4 ай бұрын
Now I am wondering why my professor's lecture notes and neso lectures are exactly same. 😂😂
@aswinmanmathans6837
@aswinmanmathans6837 3 ай бұрын
😂.. they both refer to the same textbook ,like me (still I used to look into yt😂)
@akshayc0
@akshayc0 2 ай бұрын
same🙂
@moakhirul
@moakhirul 9 күн бұрын
Your professor is smart! Why waste time making lecture notes when you can find them free on KZfaq.
@amogh8237
@amogh8237 4 күн бұрын
The text books are the same
@dhaneshpt8641
@dhaneshpt8641 11 ай бұрын
Thank you very much..
@johnashok9075
@johnashok9075 11 ай бұрын
tq soo much sir
@moakhirul
@moakhirul 9 күн бұрын
Great video, very nicely made. 1. I am still confused about the swap in Decryption where LD16 becomes LD17 (and RD16 becomes RD17). Isn't the only purpose of swap to change LD to RD and vice versa. Why LD16 is not becoming RD17. If an element is written on the left of the diagram, why is it still written "RD"17, instead of "LD"17? 2. Also, if in encryption, the last action was a 32 bit swap, to reverse this during decryption, why is the swap not the first thing to do?
@perioguatexgaming1333
@perioguatexgaming1333 10 ай бұрын
The Encryption Fig is wrong I guess, The LE1 will be created from RE0 after it passes through F and not Directly.
@telsaabi9865
@telsaabi9865 10 ай бұрын
you're wrong , its correct as displayed in the video
@blackdevil3548
@blackdevil3548 Жыл бұрын
Hello Can you suggest a one best and simple subject for open electives in BscIt I'm very confused..😢
@sandhyabhattarai1750
@sandhyabhattarai1750 11 ай бұрын
Multimedia
@NTxleO337
@NTxleO337 4 ай бұрын
sankalchand patel university ke jai hooooo
@subbusparkz1240
@subbusparkz1240 8 ай бұрын
Y only 16 steps in encrypted processs
@arpitasutosh9861
@arpitasutosh9861 3 ай бұрын
It's example.....it doesn't matter it's 16 or not
@lonewalker5025
@lonewalker5025 6 ай бұрын
where are the examples bro? you just rambled on like my lecturer
@ritik84629
@ritik84629 4 ай бұрын
RIGHT, WORST EXPLAINATION. JUST READING THE DIAGRAM
@TheJayRamKumar
@TheJayRamKumar 11 ай бұрын
sir please upload all network security chapters. I cant afford to purchase
@EchoSubtitles1
@EchoSubtitles1 4 ай бұрын
10Q
Introduction to Data Encryption Standard (DES)
8:18
Neso Academy
Рет қаралды 233 М.
Ouch.. 🤕
00:30
Celine & Michiel
Рет қаралды 24 МЛН
I'm Excited To see If Kelly Can Meet This Challenge!
00:16
Mini Katana
Рет қаралды 28 МЛН
Iron Chin ✅ Isaih made this look too easy
00:13
Power Slap
Рет қаралды 36 МЛН
How Many Balloons Does It Take To Fly?
00:18
MrBeast
Рет қаралды 205 МЛН
Detect Hackers & Malware on your Computer (literally for free)
16:38
FEISTEL STRUCTURE IN NETWORK SECURITY || INFORMATION SECURITY
12:22
Sundeep Saradhi Kanthety
Рет қаралды 168 М.
The F Function of DES (Mangler Function)
10:29
Neso Academy
Рет қаралды 68 М.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
Block Cipher Modes of Operation
6:59
Neso Academy
Рет қаралды 50 М.
How To Design A Completely Unbreakable Encryption System
5:51
Half as Interesting
Рет қаралды 488 М.
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
Computerphile
Рет қаралды 954 М.
Ouch.. 🤕
00:30
Celine & Michiel
Рет қаралды 24 МЛН