RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified. The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
Excellent mam.Its really good.
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified.
The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
I am From Nagpur Maam these lectures are helping me a lot thank you
tomorrow is your paper ?
@@shikharforwebartister yes and if you have today then all the best
thanks.
@@devashishjaybhaye7258
Thanks, it went OK for me. How was yours?@@devashishjaybhaye7258
it was good @@shikharforwebartister
Change speed to .75 and lesson will be way more relaxed and understandable. 👍🏽
surely you mean 1.75x
idhar 2x kam pad raha hai
we dont hv time brother
Mean while me: got bored of 2x , youtube need to add more than 2x 😂
Really very easy to understand it's very very useful mam..
Thanks a lot 🙏🙏🙏🙏🙏🙏
Nyc explanation
mam, your explanation is excellent.💖 But in video description why its mention as Block cipher algorithm?
your explanation is very nice please release all lecture form chapter one up to the last chapter
mam it is really good but why dont you start start data mining
Thank u ma'am
aapne to badi jaldi padhai start kar di :)
Very good
Mam where is your example video for rc4
Thanku for uploading 😀🙏
A question against which I have to XOR the encrypted frame to return the keystream.
Mam plz explain RC5 ......
That’s very complicated and lengthy planning to do it in the last
yes mam,explain rc5
Please explain RC5 mam
In the second step, shouldn’t the i and j mod operations be 4 (i = (i+1) mod 4) as per your example or is it always 256 (i = (i+1) mod 256)? at 7:18
In key scheduling, initially we took j=0 for 1st step but what about j value in 2nd step while i=1. Mam
This is my doubt tooo
What abt RC5 ma’am ? Is it imp for Exam ?
Mam please make a on RC5
Its too imp as of now because we have exam on 20th of January
Mam where is yhe example
Mam can to upload video about RC5 algorithm
mam you left RC5 algorithm
Where is key distribution vdo and example vdo
Mam tell about rc5 algorithm
Okay sure
Rc5?
@@TroubleFreevideos rc5
Ma'am Rc5 algorithm also explain ma'am i hv exam on coming week
Ma'am explain RC5 algorithm
is'nt the RC4 a stream cipher?
yep
Can u please explain rc5 algorithm
bhai pehle rc4 krle fir puch
thankyo;u ssoo muchDidi apka intro music bohot loud hai
why u didnt give the CT answer?
Why so fast..
Example 🙄
Pls explain RC5 mam
RC 5 video pls madam
Where is the next video????
But RC4 is a stream cipher.
I love you
Rc5 please
Thank u ma'am
Mam please explain RC 5 algorithm...
bhai phele RC4 sikhle
Can u explain about rc5 plz