Hey Guys, if you want more such tech educational videos on this channel then please support me by subscribing to this channel & also share it with your friends as it helps me create more content just for you ✌
You didn't mention the swapping of 2nd & 3rd 16-bit blocks that occurs at end of every round except after 8th round. Also for key generation you could have explained directly that 128 bit key is broken into 8 subkeys and then the whole key is shifted left cyclically by 25 bits and entire process is repeated until 52 keys are obtained. Else your explanation was great!!
Most welcome my friend :-) Also I just saw your channel and you have put a lot of content on beatboxing and flute video. Its amazing buddy. Loved it! Keep up the good work my friend 😇✌
The encryption was clear enough, however, how do we decrypt the result obtained? I believe the order of the subkeys is different, and the process stays the same? Could you elaborate a bit on this topic?
I was wondering if you could tell me where can I found an example for the 8 rounds to depug my code and test it , I have searched a lot but all the examples I found was for the simplified algorithm not the 64 bit one
Hey Guys, if you want more such tech educational videos on this channel then please support me by subscribing to this channel & also share it with your friends as it helps me create more content just for you ✌
i saw almost 5 videos be fore this but this is the most accurate and best
perfectly articulated! great video!!
Thank you so much brother. I would request you to please share the videos with your friends too. That'll be the best help and support for everyone 😇👍
You didn't mention the swapping of 2nd & 3rd 16-bit blocks that occurs at end of every round except after 8th round. Also for key generation you could have explained directly that 128 bit key is broken into 8 subkeys and then the whole key is shifted left cyclically by 25 bits and entire process is repeated until 52 keys are obtained. Else your explanation was great!!
very great and wonderful explanation.....Your presentation is our success...ALL the best Sir
You nailed it.. This video was very helpful.. The presentation was neat and understandable.. keep on going... 👏👏✌️
Thank you so much bro 😁 I'm glad to hear this from you. Please do share this video with your friends too buddy 🤟
Thanks a ton bro, the entire playlist is great
Subscribed 🤗
Thank you so much Pavan 😇 means a lot to me. Please do share it with your friends too 🙏😇
Thank you so much! Your videos are superbly well pace and really easy to digest.
Most welcome my friend :-)
Also I just saw your channel and you have put a lot of content on beatboxing and flute video. Its amazing buddy. Loved it! Keep up the good work my friend 😇✌
@@SimpleSnippets oh that's long time ago haha, thanks!
✌️😊
Hi , dear Sir, at 14:48 you have to say 65 to 128 instead of saying 67 to 128....make it obseve....
just a suggestion
keep block diagram for one round from wiki
it would be easy to remember it
Will keep this in mind and try if I find it relevant 😇✌
Can you calrify on what basis you have chosen 25 bits to left shif?? at 15:00 min
You are great😍
Thank you so much bro 😊 glad you liked the video ✌️
Thank you so much
You're most welcome
Super explanation bro keep doing other topics also👌👍
Thank you so much brother 😇✌️ happy to hear this from you. Please do share the videos with your friends too ✌️👍
Confusion was applied well.
The encryption was clear enough, however, how do we decrypt the result obtained? I believe the order of the subkeys is different, and the process stays the same? Could you elaborate a bit on this topic?
I was wondering if you could tell me where can I found an example for the 8 rounds to depug my code and test it , I have searched a lot but all the examples I found was for the simplified algorithm not the 64 bit one
best😄
Sir you say 54 sub-keys instead of 52 sub-keys 10:34
no solved example
hi, sir, where is the usage of confusion and diffusion?
U didn't say that p2 and p3 are swapped and sent to the next round
But where is DES??
I have it on my channel under network security playlist. Do check it ✌️
What to do if the plain text contain more than 64 bits?
Then you divide it in more than 1 block and apply same IDEA algorithm onto each block. Essentially thats what block ciphers do. ✌😇
in the text book it says it has 17 rounds, I dont get it.
can u send me this book?
Arm chip?
suppr sir
Thank you bro :-) Glad to hear this from you 😇
10Q
in the text book it says it has 17 rounds, I dont get it.