Course content

NETWORK SECURITY - FEISTEL STRUCTURE

FEISTEL STRUCTURE
Most of the block ciphers follows the Feistel Structure.
Plain text is processed in terms of blocks
Plain text is divided into two equal halves
Plain text is processed in number of rounds
Sub Keys are generated for each round.
Views
0 Total Views
0 Members Views
0 Public Views
Actions
0 Likes
0 Dislikes
0 Comments
Share on Social Networks
Share Link
Share by mail

Please login to share this video by email.

Embed in your website