DOUBT:Sister if 8 bit is xored with 8 bit then result would be of length 8 but.. After performing for operations 3 times on total 32 bits which divided into 4 8 bits the result would be of 8 bit length. Am I right?! Or wrong
It took me a minute to realize that you were actually constructing a blowfish. This is beyond my current cryptography class. We dont learn how to make the encryption. Very interesting.
mam in the function (F) the output of sbox 1 and s box 2 will be added and the resulting output will be xor with the output of Sbox 3 . at last the output of this xoer operation will be added with the output of sbox 4 which will finally give us the 32 bits output(y).
You missed how to initialize the the p-array and Elements of S-box in the first place. We have to initialize the them by the fractional part of pi (π) in hexadecimal number system.
We will not do XOR for Sbox1 and Sbox2 ..we should add both of them and then o/p is XOR with Sbox3 then the result should add to the Sbox4 then output will generate
Ma'am, I implemented blowfish using a library, its ciphertext(encrypted text) is not always 64 bits, depends on plaintext length. I'm confused. Pls help
God bless you really. No words to express I feel like my friend teaching me. So clear in teaching the concept dear.
super mam i litteraly understand your way of explanation mam now ican darely give a seminar on this topic
well explained !literally i have sem tomorrow and I am learning topics very fast through your channel....
Mam, can you provide examples for every topic then we can understand more clearly....
G bht acha smjhaya mam apmny
DOUBT:Sister if 8 bit is xored with 8 bit then result would be of length 8 but.. After performing for operations 3 times on total 32 bits which divided into 4 8 bits the result would be of 8 bit length. Am I right?! Or wrong
It took me a minute to realize that you were actually constructing a blowfish. This is beyond my current cryptography class. We dont learn how to make the encryption. Very interesting.
mam in the function (F) the output of sbox 1 and s box 2 will be added and the resulting output will be xor with the output of Sbox 3 . at last the output of this xoer operation will be added with the output of sbox 4 which will finally give us the 32 bits output(y).
cipher text generated
You missed how to initialize the the p-array and Elements of S-box in the first place. We have to initialize the them by the fractional part of pi (π) in hexadecimal number system.
You are goddes to our NSC exam of JNTUH.
no matter how nerdy a topic is, there's some person with an indian accent that made an explanation about it
Thank u very mam, u explaind such a complicated topic in a easy way😍😍😍
wonderful teacher award goes to you
You explained very well 👋👏
mam way of telling superrrrrr
madam we will be pleased and thankful to you if you could upload a series of lectures on Natural Language Processing(NLP)🙏🙏
We will not do XOR for Sbox1 and Sbox2 ..we should add both of them and then o/p is XOR with Sbox3 then the result should add to the Sbox4 then output will generate
I agree, at least every other source that I've found shows AND gate in that step.
Exactly i just realised it after writing it the same way madam explained all XOR in video.. lol 😵
crisp and clear
Which values we will assign to S-boxes and P Araay these will be random or work with any formula or structure? please explain this
In last step of the diagram i.e at p18 we should not use F function rather we should use p17 I guess
super mam
explaine4s about blow fish algorithm
I understand a lot from this video this more use watching this video and are you teaching in any collages send me details i will join
Pls Make videos of subjects Cyber Forensics , Environmental Impact Assessment, Organisational Behaviour in jntuh syllabus
just one word your lecture was kcpd
In if your explanation is with sample plaintext that would be good
can you tell me about the existing or possible attacks or scenarios proposed against the blowfish algorithmT
Madam can you please make videos on cloud computing...!
Ma'am, I implemented blowfish using a library, its ciphertext(encrypted text) is not always 64 bits, depends on plaintext length. I'm confused. Pls help
Plz make a video on FIREWALLS.
In this week I have a exam
The textbook for my network security course is frankly poorly written and the TTS features are half-functional. I appreciate your work.
Tqsm Mam❣️......Nice explanation 😊
Most welcome 😊
Sis will u please maka a videos on machine Learning subject jntuk r19 regulation
My exam date 16/11/2022
Yes
Could u explain RC5 algorithm?
Can you please make SPPM videos 🥺🥺 its really difficult to understand
Some people say you have mistaken some concepts, Someone please verify if all of her concepts is correct or not
Pls Share the notes about this topic
Take 64 bit PT (initially all bits are 0)
Subkey is Generated
How subkey is generated? I don't understad.
Mam please can you make a Playlist of machine learning vedioes. U r explain great and easy to understand
but you didn't explain why we have taken all bits as 0 in initial plain text.
It will be great if you do one playlist on FLAT subject, BEFA thank you for your help
BEFA already done
mam can u please add CNS playlist in your playlists..........
And in function how do s-box and 8-bit data are interacting
Hi mam., how to pass big data analytics importants topics and important question plz mam
Please do on compiler design mam
please, do videos on electronic measurement and instrumentation , we have supply exam on 27/08
Mam make videos on fba (jntuh subject)
😃tq mam it's means a lot to us
Nice one,
Can I know your qualification.?
real time system exam date - 14-03-2022 jntuh syllabus
Explain RC5 Algorithm.
😊
4-1 exams are in jan last week
Please explain with plaintext
Thop madam meru
Mam..can you explain each topic with example..that will be very useful...
Make videos on real time systems
Tq u mam
mam aap bohot beutiful ho :(
GIVEN US AN EXAMPLE WOULD HAVE ADD MORE CLEARITY TO PUR UNDERSTANDING
could you share the notes please
from 9 february
Machine learning mam
Mam,could you please make versions on data base and management systems
triple DES
🤗🤗🤗🤗🤗
Talk a bit slower
Iam watching this video on 1.25x speed 😅😅
twofish
zoom out