RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified. The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard.
Change speed to .75 and lesson will be way more relaxed and understandable. 👍🏽
surely you mean 1.75x
idhar 2x kam pad raha hai
we dont hv time brother
Mean while me: got bored of 2x , youtube need to add more than 2x 😂
mam it is really good but why dont you start start data mining
I am From Nagpur Maam these lectures are helping me a lot thank you
tomorrow is your paper ?
@@shikharforwebartister yes and if you have today then all the best
thanks.
@@devashishjaybhaye7258
Thanks, it went OK for me. How was yours?@@devashishjaybhaye7258
it was good @@shikharforwebartister
In RC4 encryption for the DMR system we use this protocol, after the use of the two algorithms KSA and PRGA resulting from applying them to the private key, plus the initialisation vector we get a keystream, the encryption as such is the result of performing an XOR of this keystream and the voice in clear, taking into account that in each super frame the initialisation vector is modified.
The question is the following, if I have the encrypted voice, against which element should I perform this XOR to the encrypted voice if I do not know the key and therefore, the keystream.
Really very easy to understand it's very very useful mam..
Thanks a lot 🙏🙏🙏🙏🙏🙏
Excellent mam.Its really good.
mam, your explanation is excellent.💖 But in video description why its mention as Block cipher algorithm?
your explanation is very nice please release all lecture form chapter one up to the last chapter
Mam please make a on RC5
Its too imp as of now because we have exam on 20th of January
thankyo;u ssoo muchDidi apka intro music bohot loud hai
Very good
Mam where is your example video for rc4
What abt RC5 ma’am ? Is it imp for Exam ?
mam you left RC5 algorithm
Mam where is yhe example
In key scheduling, initially we took j=0 for 1st step but what about j value in 2nd step while i=1. Mam
This is my doubt tooo
Nyc explanation
A question against which I have to XOR the encrypted frame to return the keystream.
Ma'am Rc5 algorithm also explain ma'am i hv exam on coming week
Mam plz explain RC5 ......
That’s very complicated and lengthy planning to do it in the last
yes mam,explain rc5
Please explain RC5 mam
Thank u ma'am
aapne to badi jaldi padhai start kar di :)
Example 🙄
Where is key distribution vdo and example vdo
why u didnt give the CT answer?
Why so fast..
Mam can to upload video about RC5 algorithm
Ma'am explain RC5 algorithm
Thanku for uploading 😀🙏
is'nt the RC4 a stream cipher?
yep
But RC4 is a stream cipher.
Can u please explain rc5 algorithm
bhai pehle rc4 krle fir puch
In the second step, shouldn’t the i and j mod operations be 4 (i = (i+1) mod 4) as per your example or is it always 256 (i = (i+1) mod 256)? at 7:18
RC 5 video pls madam
Mam tell about rc5 algorithm
Okay sure
Rc5?
@@TroubleFreevideos rc5
Where is the next video????
Pls explain RC5 mam
Rc5 please
Mam please explain RC 5 algorithm...
bhai phele RC4 sikhle
Thank u ma'am
Can u explain about rc5 plz