very nice, thank you. This was really a well-done and (relatively) simple to follow explanation. As suggestions for a future videos, I'd really love to see some of these other aspects mentioned: 1. If possible, an explanation of the rationale behind the cipher. Why these steps make it secure? Or, why these steps make it easy to implement in hardware? 2. A brief review of known attacks on the cipher to date. Is it still secure? 3. Speed. How fast is it with respect to other popular ciphers (eg AES, ChaCha...)? 4. How widely is it used? Did it have practical success? In any case, I really enjoyed the video as it is.
very nice, thank you. This was really a well-done and (relatively) simple to follow explanation.
As suggestions for a future videos, I'd really love to see some of these other aspects mentioned:
1. If possible, an explanation of the rationale behind the cipher. Why these steps make it secure? Or, why these steps make it easy to implement in hardware?
2. A brief review of known attacks on the cipher to date. Is it still secure?
3. Speed. How fast is it with respect to other popular ciphers (eg AES, ChaCha...)?
4. How widely is it used? Did it have practical success?
In any case, I really enjoyed the video as it is.
great stuff!
It works. Great.
amazing video !!! 👏👏👏
Thx 🙂