Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
@shanthinimarimuthu66746 жыл бұрын
Sir, First i need to say ur teaching is superb.. Can u send me the link for CMAC ...
@anmaraljanabi71374 жыл бұрын
God bless you
@maruboyanasumanasri8474Ай бұрын
Thank you sir, I understood well because of your explanation 👍👍
@ronnelagulto83106 жыл бұрын
YOu are so great explaining this...BRAVO with you sir
@sundeepsaradhi6 жыл бұрын
hi ronnel thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@shitang80314 жыл бұрын
HI sir, many thanks for your video! I would like to ask if i use SHA256 and I will get a 256 bits output. However, if my b bit is smaller than 256, should I pad anything on it? why I cannot just compute the hash function and get 256 bits string as my output?
@syedasurraiyafatima63824 жыл бұрын
Very clear explanation sir. Thank you so much sir.
@hitendusseja66153 ай бұрын
Nice video sir Nicely explained
@praneethcj65446 жыл бұрын
very well explained sir ...!!! life saviour for exams
@sundeepsaradhi6 жыл бұрын
hi praneeth all the best for your exams thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@HayDay_Heaven4 жыл бұрын
Thank you so much sir.. neat explanation
@kavanasalanki5 жыл бұрын
Seriously it helped me sir.... Thank you so much
@zsurdo2 жыл бұрын
Excellent explanation, but I have a question with the condition (0 < K < b) wich is the value for b, how many bits has b? or how many bits I need to add on the left of k.?
@Tollmer6 жыл бұрын
The best explanation on youtube. Thanks for sharing your knowledge :-) But one question i have. The value of opad and ipad are constants? And if they are constants, are this constants the same for every hashfunction?
@sundeepsaradhi6 жыл бұрын
hi yes these values are not constants they may vary depending on algorithm. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@manjitshakya23414 жыл бұрын
Thank you, sundeepsaradhi Keep doing what you do
@salilmanocha91394 жыл бұрын
you are one of the best teachers
@AartiSharma-nj2ic6 жыл бұрын
Viewed all ur videoes Best teaching method n easy Thank you
@sundeepsaradhi6 жыл бұрын
hi sharma thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@SahilSikarwarBIT5 жыл бұрын
He is speaking the language of gods #saviour #Lord
@pallavithakur33955 жыл бұрын
Really a huge thank u sir... u saved 12 marks for me...
@bhavyaparikh6673 ай бұрын
BEST!!!!!!
@rajeshawal772 Жыл бұрын
Thank you so much!
@Babulal-kq2ib4 ай бұрын
In mac also we used key here also not getting the difference between two.
@ganeshjaggineni4097 Жыл бұрын
NICE SUPER EXCELLENT MOTIVATED
@21day52 жыл бұрын
nice explanation
@abishaa66912 жыл бұрын
Very nice explanation...thank you sir
@arian74725 жыл бұрын
many thx sir just you said many times that HMAC not use key, but the key has a main role here, can you explain i know MD5 and SHA is just integrity mechanism and HMAC is modify of them by adding a key to avoid Man in the middle
@ravivarma60463 жыл бұрын
Thank you sir ... superb 👌👌 explained
@kavanpuranik985 жыл бұрын
Awesome explanation! Thanks!!
@youknowwho33774 жыл бұрын
Very well explained..... Thank you 😃
@shaikabdulgaffar44385 жыл бұрын
Thank you so much sir really very useful. Once again thank u😊
@sreelekshmianair88706 жыл бұрын
well explained..thank you sir
@sundeepsaradhi6 жыл бұрын
hi sreelakshmi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@theguy8475 жыл бұрын
Thanks a lot sir.You saved my day
@nehalsingh7852 жыл бұрын
awesome tutorial sir
@mayurPrmr1182 Жыл бұрын
Great explanation 😀
@chethandandi5907 Жыл бұрын
Yes...there is god...
@ramolashishupal47835 жыл бұрын
Very helpful videos sir Thank u sir
@arian74725 жыл бұрын
Very Good but always try to clarify how each peer generate the key then shared also if you can mirror that to a complete VPN negotiation using IKE v1 and 2 it will be very good the key creation and exchange is very important and missing with all who study vpn
@ghufrankhan84583 жыл бұрын
Thank you for your help sir
@ambicabanchode25815 жыл бұрын
excellent work sir
@sreenaunnikrishnan31355 жыл бұрын
Sir please explain security of HMAC
@rahimanabdul57225 ай бұрын
Suoer sir
@shivamnandha80754 жыл бұрын
Very useful......
@jpmtech40634 жыл бұрын
Sir, could you please upload a video explaining Time based One Time Passwords (TOTP) and how they are calculated
@tehreemkhzr82906 жыл бұрын
A well explained tutorials..keep it up.
@sundeepsaradhi6 жыл бұрын
hi tehreem thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@Raj_Patel216 жыл бұрын
Very nice explanation
@sakinavetiprathushya55784 жыл бұрын
Sir is there any difference in this Hmac algorithm compared to remaining algorithms
@pawankesharwani78315 жыл бұрын
what is ipad,opad and define how it is use b/8 times.
@pasindusiriwardana52425 жыл бұрын
you can find the answer below . See Domenico's answer
@vishavgupta37175 жыл бұрын
Thank You Sir
@divyasimhadri46773 жыл бұрын
Thank you so much sir
@nithinrupireddy75406 жыл бұрын
Fantastic
@sundeepsaradhi6 жыл бұрын
hi Nithin thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@sangeethamanekar24216 жыл бұрын
Hw can write ntwrk security in exm
@banderallogmany19125 жыл бұрын
Really thank you, you saved my time. In 09:50 you may meant pad to b bits.
@jithinkgeorge22375 жыл бұрын
awesome!
@santoshkumarmehra684 жыл бұрын
Thanks you sir ji
@rdcreations4u2092 жыл бұрын
U r thop😘
@jayachandranuthalapati25195 жыл бұрын
Thank you sir
@thakurneelima4414 жыл бұрын
why we need to repeat ipad and opad fpr b/8times
@dinnusebastian46155 жыл бұрын
Is any video on mac (messsage authentication code) is available here..
@sivabhaskarreddygonapati88245 жыл бұрын
i cant understand b/8 with ipad amd opad .Can u tell me about it??
@kotiprasad55226 жыл бұрын
Can you please kindly tell the difference between the authentication algorithms and encryption algorithms with a real time example in simple words?
@sundeepsaradhi6 жыл бұрын
hi prasad Authentication algorithms are meant for verifying the sender and to acheive integrity that mean the receiver should know that the data has not been modified during the transmission. Encryption algorithms are meant for providing the security for the data that is converting plain text to cipher text. Hope your doubt has been clarified.
@a.yashwanth3 жыл бұрын
If you receive a post and it's from the president then you will verify the sign to make sure. That is authentication. If you send a message to someone using WhatsApp then no one can understand the message other than you 2. That is encryption.
@bellalmahtab82203 жыл бұрын
Sir how u insert these no to the iPad or opad
@sakinavetiprathushya55784 жыл бұрын
What is advantage of HMAC sir
@swaroopkv4540 Жыл бұрын
Repeat b by 8 times means?
@vibhuthakur56655 жыл бұрын
Sir is there any difference between HMAC algo and efficient implementation of HMAC?
@NitishRaj5 жыл бұрын
Yes. Efficient itself depicts.
@siddanatibhargav30705 жыл бұрын
Y r u don't make videos on idea n cast128 blowfish Make videos for these they r useful for us
@siddarthakolani57965 жыл бұрын
Nice explanation sir In this what if K value is equal to B, then there won't be k+? Then how we should take k+ value for further process??
@zsurdo2 жыл бұрын
when K=b you have K+. this is the condition. in my case.. my question is how many bits has b.....? to condition will be positive.
@balashivuduu21016 жыл бұрын
Sir explain Elliptic curve cryptography algorithm
@sundeepsaradhi6 жыл бұрын
hi bala thanks for your interest towards our channel. soon i will try to upload it.
@besalraj43343 жыл бұрын
Thankyou Sir _/\_
@DrIBLal6 жыл бұрын
Will you please explain ipad and opad with more clarity
@surajdaiya63925 жыл бұрын
Yaa ,can you explain opad and iPad in details with examples
@sundeepsaradhi5 жыл бұрын
Hi lal These are the predefined values to be used in algorithm. Thanks for your support and interest towards our channel and share our channel with your friends. Keep following our channel.
@sauravkumar-yh7tv6 жыл бұрын
What is the length of 'b' bits? And What mean b/8?
@sundeepsaradhi6 жыл бұрын
hi saurav length of b depends on plain text. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@domenicorodilosso54655 жыл бұрын
if the length of K+ is for example 128 bits, in order to XOR this value with ipad or opad value, we need K+ and ipad (or opad) of the same size. So we know that the ipad's value is 00110110, so 8 bits, in order to reach the size of K+ (128 bits), we have to repeat this value (00110110) 128/8 = 16 times. At the end of this process K+ and ipad will have the same length and they will can be xored.
@pasindusiriwardana52425 жыл бұрын
@@domenicorodilosso5465 nice
@gummadinagalakshmi40835 жыл бұрын
Tq
@amudhapi64923 жыл бұрын
What is the purpose of hmac ???
@rajasreenair64966 жыл бұрын
Well explained. Thanks a lot sir
@sundeepsaradhi6 жыл бұрын
hi rajasree thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@neelimavaddi22185 жыл бұрын
Sir plzz explain SHA-3.3...please do reply...
@duraivelp8795 жыл бұрын
Can u pls upload the CMAC Algorithm sir
@kempannamuniyegowda25666 жыл бұрын
hi nice easy to understand sir upload video for sha1
@sundeepsaradhi6 жыл бұрын
hi muniyegowda i have uploaded sha-512 and it is one of the variant of sha-1 the only difference is the output hash code.the implementation is same so once go through the video and let me know if you find any difficullty.
@nikhilreddychaganti7614 жыл бұрын
mac algorithm and hmac algorithm is same are different
@Girliyapaa-Mostly-Sane3 жыл бұрын
anybody tell me if k=0011 b=8 what is the value of k+ , si, ipad, opad, s2.
@vishalthapa5185 жыл бұрын
where is example of it?
@shruthikamalk49155 жыл бұрын
What does b/8 mean?
@jyothijyo64094 жыл бұрын
Sir we need hashing table techniques
@manojbabu71035 жыл бұрын
Y b/8 times ?
@swadhindas58535 жыл бұрын
sir please upload DSS and ECDSA
@nive7745 жыл бұрын
Sir i need CMAC
@kbvrama6 жыл бұрын
cmac algorithim pleasw
@KANUMURIPAVANKUMARVARMA2 жыл бұрын
hi
@praneethunknown6 жыл бұрын
Sir, Thank You very much sir.. Miru telugu valla?
@sundeepsaradhi6 жыл бұрын
hi praneeth yes i am from andhra pradesh and thanks for your interest and support towards our channel.
@atchireddy42992 жыл бұрын
i did not understand this concept sir
@chinthamokshith78874 жыл бұрын
You are a bit slow plz try to improve your speed bro but Content was 👌🏻