Authenticating Data with Message Authentication Codes

  Рет қаралды 17,459

Aleksander Essex

Aleksander Essex

3 жыл бұрын

Information Security - Week 5
In this video: Effects of ciphertext modification, the adaptive chosen ciphertext attack game (CCA2), block cipher padding, PKCS #7, padding oracle attacks, message authentication codes (MACs), hash based message authentication codes (HMAC), MAC configurations, encrypt-then-mac, mac-then-encrypt, authenticated encryption, AES-GCM
Undergraduate course on networking security and cryptography taught by Aleksander Essex, Ph.D., P.Eng., Associate professor of Software Engineering, Associate Chair (Graduate), Department of Electrical and Computer Engineering, Western University, Canada
Website:
essex.cc
Twitter:
/ aleksessex
Course topics include:
Confidentiality, authenticity, integrity, ciphers, plaintext, ciphertext, encryption, decryption, keys, key generation function, uniform random, semantic security, bits of security, brute force, Kerckhoff's principle, semantic security, ciphertext indistinguishability, IND-CPA, INC-CCA, block ciphers, message padding, PKCS 7, modes of operation, initialization vector, pseudo-random permutation, counter mode, cipher block chaining, electronic codebook mode, counter mode, CBC, ECB, CTR, Advanced Encryption Standard, AES, hash functions, random oracles, pre-image resistance, collision resistance, SHA-1, SHA-256, SHA3, SHA-513, MD5, message authentication codes, MACs, Galois counter mode, GCM, AEC-GCM, public-key cryptography, Diffie-Hellman, public-key agreement, Elliptic curve Diffie-Hellman, DHE, ECDHE, digital signatures, ECDSA, RSA signatures, PKCS v1.5, digital certificates, X.509, public-key infrastructure, PKI, certificate pinning, certificate revocation, CRL, trust store, Transport Layer Security, TLS, TLS 1.2, TLS 1.3, HTTP over TLS, HTTPS Secure Shell, SSH, ciphersuite, client hello, server hello, VPNs, TOR, 802.11, wifi encryption, client authentication, passwords, password hashing, password lengths, single sign-on, federated identity
----
Music: Arp Bounce - Geographer
Support by RFM - NCM: bit.ly/2xGHypM
Slide template: Slidesgo including Flaticons with infographics & images by Freepik

Пікірлер: 15
@JustSkillGG
@JustSkillGG 3 жыл бұрын
this video DEFINETELY deserves more views. You have done a very good job sir
@jaosberg
@jaosberg 3 жыл бұрын
Fantastic video! Well produced and a great focus on the "why's". This video is a gift to all CS-students.
@valeriewang1473
@valeriewang1473 2 жыл бұрын
I like this reasoning perspective on why should we use this algorithm! this video definitely deserves more viewers
@abreue5127
@abreue5127 2 жыл бұрын
Congratulations! Thank you for the content!
@FreeDomSy-nk9ue
@FreeDomSy-nk9ue 2 жыл бұрын
Awesome stuff. Thank you
@blowingupblocks
@blowingupblocks 2 жыл бұрын
thanks for the wonderful vid!
@citclayton
@citclayton 3 жыл бұрын
this video deserves more views!!
@maksudahossain8482
@maksudahossain8482 3 жыл бұрын
Excellent!
@1UniverseGames
@1UniverseGames 3 жыл бұрын
Is it possible sir to show it in programming perspective like how it implemented. It will be helpful, also a bit of its Mathematical explanation
@yannicklittek3314
@yannicklittek3314 3 жыл бұрын
MAC explanation at 12:35
@raquelbibi1436
@raquelbibi1436 3 жыл бұрын
Please make a video about number two factor authentication (twitter) I got so confused cause give me so many numbers
@lobaandrade3091
@lobaandrade3091 3 жыл бұрын
okay so i was pirating movies and later that day i wanted to look at my grades but then i got an error message while signing in saying an attacker changed something. edit: i just turned on cookies and it works now lol
@gam__04
@gam__04 2 жыл бұрын
this video is so complicated 😧😧
@tsunningwah3471
@tsunningwah3471 3 ай бұрын
弓弓
@tsunningwah3471
@tsunningwah3471 Ай бұрын
zhina
Securing Stream Ciphers (HMAC) - Computerphile
9:24
Computerphile
Рет қаралды 303 М.
Encryption Basics and Classical Ciphers
13:12
Aleksander Essex
Рет қаралды 8 М.
The delivery rescued them
00:52
Mamasoboliha
Рет қаралды 7 МЛН
Ну Лилит))) прода в онк: завидные котики
00:51
WHY DOES SHE HAVE A REWARD? #youtubecreatorawards
00:41
Levsob
Рет қаралды 42 МЛН
HMAC explained | keyed hash message authentication code
6:33
Jan Goebel
Рет қаралды 64 М.
Semantic Security and the One-Time Pad
14:30
Aleksander Essex
Рет қаралды 7 М.
What Are AEAD Ciphers?
11:09
F5 DevCentral
Рет қаралды 23 М.
Hashing vs Encryption Differences
19:38
Programming w/ Professor Sluiter
Рет қаралды 161 М.
Encrypting with Block Ciphers
21:42
Aleksander Essex
Рет қаралды 35 М.
Fingerprinting with Hash Functions
18:31
Aleksander Essex
Рет қаралды 8 М.
Выложил СВОЙ АЙФОН НА АВИТО #shorts
0:42
Дмитрий Левандовский
Рет қаралды 1,8 МЛН
Apple watch hidden camera
0:34
_vector_
Рет қаралды 56 МЛН
keren sih #iphone #apple
0:16
Muhammad Arsyad
Рет қаралды 365 М.
📱 SAMSUNG, ЧТО С ЛИЦОМ? 🤡
0:46
Яблочный Маньяк
Рет қаралды 1,9 МЛН