No video

NETWORK SECURITY - HMAC ALGORITHM

  Рет қаралды 147,183

Sundeep Saradhi Kanthety

Sundeep Saradhi Kanthety

Күн бұрын

/ sundeepsaradhi

Пікірлер: 113
@maheshb3756
@maheshb3756 3 жыл бұрын
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
@shanthinimarimuthu6674
@shanthinimarimuthu6674 6 жыл бұрын
Sir, First i need to say ur teaching is superb.. Can u send me the link for CMAC ...
@anmaraljanabi7137
@anmaraljanabi7137 4 жыл бұрын
God bless you
@maruboyanasumanasri8474
@maruboyanasumanasri8474 Ай бұрын
Thank you sir, I understood well because of your explanation 👍👍
@ronnelagulto8310
@ronnelagulto8310 6 жыл бұрын
YOu are so great explaining this...BRAVO with you sir
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi ronnel thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@shitang8031
@shitang8031 4 жыл бұрын
HI sir, many thanks for your video! I would like to ask if i use SHA256 and I will get a 256 bits output. However, if my b bit is smaller than 256, should I pad anything on it? why I cannot just compute the hash function and get 256 bits string as my output?
@syedasurraiyafatima6382
@syedasurraiyafatima6382 4 жыл бұрын
Very clear explanation sir. Thank you so much sir.
@hitendusseja6615
@hitendusseja6615 3 ай бұрын
Nice video sir Nicely explained
@praneethcj6544
@praneethcj6544 6 жыл бұрын
very well explained sir ...!!! life saviour for exams
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi praneeth all the best for your exams thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@HayDay_Heaven
@HayDay_Heaven 4 жыл бұрын
Thank you so much sir.. neat explanation
@kavanasalanki
@kavanasalanki 5 жыл бұрын
Seriously it helped me sir.... Thank you so much
@zsurdo
@zsurdo 2 жыл бұрын
Excellent explanation, but I have a question with the condition (0 < K < b) wich is the value for b, how many bits has b? or how many bits I need to add on the left of k.?
@Tollmer
@Tollmer 6 жыл бұрын
The best explanation on youtube. Thanks for sharing your knowledge :-) But one question i have. The value of opad and ipad are constants? And if they are constants, are this constants the same for every hashfunction?
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi yes these values are not constants they may vary depending on algorithm. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@manjitshakya2341
@manjitshakya2341 4 жыл бұрын
Thank you, sundeepsaradhi Keep doing what you do
@salilmanocha9139
@salilmanocha9139 4 жыл бұрын
you are one of the best teachers
@AartiSharma-nj2ic
@AartiSharma-nj2ic 6 жыл бұрын
Viewed all ur videoes Best teaching method n easy Thank you
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi sharma thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@SahilSikarwarBIT
@SahilSikarwarBIT 5 жыл бұрын
He is speaking the language of gods #saviour #Lord
@pallavithakur3395
@pallavithakur3395 5 жыл бұрын
Really a huge thank u sir... u saved 12 marks for me...
@bhavyaparikh667
@bhavyaparikh667 3 ай бұрын
BEST!!!!!!
@rajeshawal772
@rajeshawal772 Жыл бұрын
Thank you so much!
@Babulal-kq2ib
@Babulal-kq2ib 4 ай бұрын
In mac also we used key here also not getting the difference between two.
@ganeshjaggineni4097
@ganeshjaggineni4097 Жыл бұрын
NICE SUPER EXCELLENT MOTIVATED
@21day5
@21day5 2 жыл бұрын
nice explanation
@abishaa6691
@abishaa6691 2 жыл бұрын
Very nice explanation...thank you sir
@arian7472
@arian7472 5 жыл бұрын
many thx sir just you said many times that HMAC not use key, but the key has a main role here, can you explain i know MD5 and SHA is just integrity mechanism and HMAC is modify of them by adding a key to avoid Man in the middle
@ravivarma6046
@ravivarma6046 3 жыл бұрын
Thank you sir ... superb 👌👌 explained
@kavanpuranik98
@kavanpuranik98 5 жыл бұрын
Awesome explanation! Thanks!!
@youknowwho3377
@youknowwho3377 4 жыл бұрын
Very well explained..... Thank you 😃
@shaikabdulgaffar4438
@shaikabdulgaffar4438 5 жыл бұрын
Thank you so much sir really very useful. Once again thank u😊
@sreelekshmianair8870
@sreelekshmianair8870 6 жыл бұрын
well explained..thank you sir
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi sreelakshmi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@theguy847
@theguy847 5 жыл бұрын
Thanks a lot sir.You saved my day
@nehalsingh785
@nehalsingh785 2 жыл бұрын
awesome tutorial sir
@mayurPrmr1182
@mayurPrmr1182 Жыл бұрын
Great explanation 😀
@chethandandi5907
@chethandandi5907 Жыл бұрын
Yes...there is god...
@ramolashishupal4783
@ramolashishupal4783 5 жыл бұрын
Very helpful videos sir Thank u sir
@arian7472
@arian7472 5 жыл бұрын
Very Good but always try to clarify how each peer generate the key then shared also if you can mirror that to a complete VPN negotiation using IKE v1 and 2 it will be very good the key creation and exchange is very important and missing with all who study vpn
@ghufrankhan8458
@ghufrankhan8458 3 жыл бұрын
Thank you for your help sir
@ambicabanchode2581
@ambicabanchode2581 5 жыл бұрын
excellent work sir
@sreenaunnikrishnan3135
@sreenaunnikrishnan3135 5 жыл бұрын
Sir please explain security of HMAC
@rahimanabdul5722
@rahimanabdul5722 5 ай бұрын
Suoer sir
@shivamnandha8075
@shivamnandha8075 4 жыл бұрын
Very useful......
@jpmtech4063
@jpmtech4063 4 жыл бұрын
Sir, could you please upload a video explaining Time based One Time Passwords (TOTP) and how they are calculated
@tehreemkhzr8290
@tehreemkhzr8290 6 жыл бұрын
A well explained tutorials..keep it up.
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi tehreem thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@Raj_Patel21
@Raj_Patel21 6 жыл бұрын
Very nice explanation
@sakinavetiprathushya5578
@sakinavetiprathushya5578 4 жыл бұрын
Sir is there any difference in this Hmac algorithm compared to remaining algorithms
@pawankesharwani7831
@pawankesharwani7831 5 жыл бұрын
what is ipad,opad and define how it is use b/8 times.
@pasindusiriwardana5242
@pasindusiriwardana5242 5 жыл бұрын
you can find the answer below . See Domenico's answer
@vishavgupta3717
@vishavgupta3717 5 жыл бұрын
Thank You Sir
@divyasimhadri4677
@divyasimhadri4677 3 жыл бұрын
Thank you so much sir
@nithinrupireddy7540
@nithinrupireddy7540 6 жыл бұрын
Fantastic
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi Nithin thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@sangeethamanekar2421
@sangeethamanekar2421 6 жыл бұрын
Hw can write ntwrk security in exm
@banderallogmany1912
@banderallogmany1912 5 жыл бұрын
Really thank you, you saved my time. In 09:50 you may meant pad to b bits.
@jithinkgeorge2237
@jithinkgeorge2237 5 жыл бұрын
awesome!
@santoshkumarmehra68
@santoshkumarmehra68 4 жыл бұрын
Thanks you sir ji
@rdcreations4u209
@rdcreations4u209 2 жыл бұрын
U r thop😘
@jayachandranuthalapati2519
@jayachandranuthalapati2519 5 жыл бұрын
Thank you sir
@thakurneelima441
@thakurneelima441 4 жыл бұрын
why we need to repeat ipad and opad fpr b/8times
@dinnusebastian4615
@dinnusebastian4615 5 жыл бұрын
Is any video on mac (messsage authentication code) is available here..
@sivabhaskarreddygonapati8824
@sivabhaskarreddygonapati8824 5 жыл бұрын
i cant understand b/8 with ipad amd opad .Can u tell me about it??
@kotiprasad5522
@kotiprasad5522 6 жыл бұрын
Can you please kindly tell the difference between the authentication algorithms and encryption algorithms with a real time example in simple words?
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi prasad Authentication algorithms are meant for verifying the sender and to acheive integrity that mean the receiver should know that the data has not been modified during the transmission. Encryption algorithms are meant for providing the security for the data that is converting plain text to cipher text. Hope your doubt has been clarified.
@a.yashwanth
@a.yashwanth 3 жыл бұрын
If you receive a post and it's from the president then you will verify the sign to make sure. That is authentication. If you send a message to someone using WhatsApp then no one can understand the message other than you 2. That is encryption.
@bellalmahtab8220
@bellalmahtab8220 3 жыл бұрын
Sir how u insert these no to the iPad or opad
@sakinavetiprathushya5578
@sakinavetiprathushya5578 4 жыл бұрын
What is advantage of HMAC sir
@swaroopkv4540
@swaroopkv4540 Жыл бұрын
Repeat b by 8 times means?
@vibhuthakur5665
@vibhuthakur5665 5 жыл бұрын
Sir is there any difference between HMAC algo and efficient implementation of HMAC?
@NitishRaj
@NitishRaj 5 жыл бұрын
Yes. Efficient itself depicts.
@siddanatibhargav3070
@siddanatibhargav3070 5 жыл бұрын
Y r u don't make videos on idea n cast128 blowfish Make videos for these they r useful for us
@siddarthakolani5796
@siddarthakolani5796 5 жыл бұрын
Nice explanation sir In this what if K value is equal to B, then there won't be k+? Then how we should take k+ value for further process??
@zsurdo
@zsurdo 2 жыл бұрын
when K=b you have K+. this is the condition. in my case.. my question is how many bits has b.....? to condition will be positive.
@balashivuduu2101
@balashivuduu2101 6 жыл бұрын
Sir explain Elliptic curve cryptography algorithm
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi bala thanks for your interest towards our channel. soon i will try to upload it.
@besalraj4334
@besalraj4334 3 жыл бұрын
Thankyou Sir _/\_
@DrIBLal
@DrIBLal 6 жыл бұрын
Will you please explain ipad and opad with more clarity
@surajdaiya6392
@surajdaiya6392 5 жыл бұрын
Yaa ,can you explain opad and iPad in details with examples
@sundeepsaradhi
@sundeepsaradhi 5 жыл бұрын
Hi lal These are the predefined values to be used in algorithm. Thanks for your support and interest towards our channel and share our channel with your friends. Keep following our channel.
@sauravkumar-yh7tv
@sauravkumar-yh7tv 6 жыл бұрын
What is the length of 'b' bits? And What mean b/8?
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi saurav length of b depends on plain text. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@domenicorodilosso5465
@domenicorodilosso5465 5 жыл бұрын
if the length of K+ is for example 128 bits, in order to XOR this value with ipad or opad value, we need K+ and ipad (or opad) of the same size. So we know that the ipad's value is 00110110, so 8 bits, in order to reach the size of K+ (128 bits), we have to repeat this value (00110110) 128/8 = 16 times. At the end of this process K+ and ipad will have the same length and they will can be xored.
@pasindusiriwardana5242
@pasindusiriwardana5242 5 жыл бұрын
@@domenicorodilosso5465 nice
@gummadinagalakshmi4083
@gummadinagalakshmi4083 5 жыл бұрын
Tq
@amudhapi6492
@amudhapi6492 3 жыл бұрын
What is the purpose of hmac ???
@rajasreenair6496
@rajasreenair6496 6 жыл бұрын
Well explained. Thanks a lot sir
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi rajasree thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@neelimavaddi2218
@neelimavaddi2218 5 жыл бұрын
Sir plzz explain SHA-3.3...please do reply...
@duraivelp879
@duraivelp879 5 жыл бұрын
Can u pls upload the CMAC Algorithm sir
@kempannamuniyegowda2566
@kempannamuniyegowda2566 6 жыл бұрын
hi nice easy to understand sir upload video for sha1
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi muniyegowda i have uploaded sha-512 and it is one of the variant of sha-1 the only difference is the output hash code.the implementation is same so once go through the video and let me know if you find any difficullty.
@nikhilreddychaganti761
@nikhilreddychaganti761 4 жыл бұрын
mac algorithm and hmac algorithm is same are different
@Girliyapaa-Mostly-Sane
@Girliyapaa-Mostly-Sane 3 жыл бұрын
anybody tell me if k=0011 b=8 what is the value of k+ , si, ipad, opad, s2.
@vishalthapa518
@vishalthapa518 5 жыл бұрын
where is example of it?
@shruthikamalk4915
@shruthikamalk4915 5 жыл бұрын
What does b/8 mean?
@jyothijyo6409
@jyothijyo6409 4 жыл бұрын
Sir we need hashing table techniques
@manojbabu7103
@manojbabu7103 5 жыл бұрын
Y b/8 times ?
@swadhindas5853
@swadhindas5853 5 жыл бұрын
sir please upload DSS and ECDSA
@nive774
@nive774 5 жыл бұрын
Sir i need CMAC
@kbvrama
@kbvrama 6 жыл бұрын
cmac algorithim pleasw
@KANUMURIPAVANKUMARVARMA
@KANUMURIPAVANKUMARVARMA 2 жыл бұрын
hi
@praneethunknown
@praneethunknown 6 жыл бұрын
Sir, Thank You very much sir.. Miru telugu valla?
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi praneeth yes i am from andhra pradesh and thanks for your interest and support towards our channel.
@atchireddy4299
@atchireddy4299 2 жыл бұрын
i did not understand this concept sir
@chinthamokshith7887
@chinthamokshith7887 4 жыл бұрын
You are a bit slow plz try to improve your speed bro but Content was 👌🏻
@rahulmacwan4494
@rahulmacwan4494 4 жыл бұрын
🤣🤣 bro? Really?
@tamilxctf4075
@tamilxctf4075 3 жыл бұрын
😏
NETWORK SECURITY - PUBLIC KEY DISTRIBUTION
32:28
Sundeep Saradhi Kanthety
Рет қаралды 102 М.
لااا! هذه البرتقالة مزعجة جدًا #قصير
00:15
One More Arabic
Рет қаралды 50 МЛН
Harley Quinn's plan for revenge!!!#Harley Quinn #joker
00:49
Harley Quinn with the Joker
Рет қаралды 27 МЛН
Doing This Instead Of Studying.. 😳
00:12
Jojo Sim
Рет қаралды 30 МЛН
NETWORK SECURITY - SHA 512 (AUTHENTICATION ALGORITHM)
42:16
Sundeep Saradhi Kanthety
Рет қаралды 219 М.
HMAC ALGORITHM || PROCEDURE || BLOCK DIAGRAM || EXAMPLE || NETWORK SECURITY
11:15
t v nagaraju Technical
Рет қаралды 27 М.
HMAC explained | keyed hash message authentication code
6:33
Jan Goebel
Рет қаралды 67 М.
NETWORK SECURITY - DIGITAL SIGNATURE ALGORITHM (DSA)
33:00
Sundeep Saradhi Kanthety
Рет қаралды 198 М.
NETWORK SECURITY - TYPES OF AUTHENTICATION (Message Encryption, MAC, Hash Functions)
40:57
MD5 Algorithm in Hindi
17:29
Rudra Singh
Рет қаралды 122 М.
Introduction to Data Encryption Standard (DES)
8:18
Neso Academy
Рет қаралды 238 М.