No video

NETWORK SECURITY - TYPES OF AUTHENTICATION (Message Encryption, MAC, Hash Functions)

  Рет қаралды 218,417

Sundeep Saradhi Kanthety

Sundeep Saradhi Kanthety

6 жыл бұрын

Three types of Authentications
1. Message Encryption
2. Message Authentication Code
3. Hash Functions.

Пікірлер: 163
@redmuffler3186
@redmuffler3186 4 жыл бұрын
I had so many "Oooohhhh!!" moments during this. Thank you so much!
@jirilzala7573
@jirilzala7573 5 жыл бұрын
Thank you so much sir. I was trying to understand this for last 3-4 hours but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
@kashmirinsights6597
@kashmirinsights6597 6 жыл бұрын
Great Video ...First Time In my 4 Years I have Commented Any Tutorial ...Your A Gem
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi Thanks for your interest towards our channel and your support towards our channel.
@gowthamiirao9010
@gowthamiirao9010 5 жыл бұрын
well explained sir. I was confused with MAC and HASH and now its clear. thank you very much.
@webnetweaverwebnetweaver9185
@webnetweaverwebnetweaver9185 4 жыл бұрын
Very concise explanation. This is the best general explanation of application security methods I've seen. Many thanks to you for this!
@iEntertainmentFunShorts
@iEntertainmentFunShorts 5 жыл бұрын
Waw awwsome...sir if you guys coming after reading books either kurose and ross or fourozen this is best lecture you found go for it with 1.25× speed.Tq sir
@mayankbhagat4154
@mayankbhagat4154 5 жыл бұрын
Sir your lectures were really very helpful. You are an outstanding teacher. I would like to suggest that after explaining each of the authentication methods or cipher algorithms you should have explained their advantages and disadvantages. That would have given us more insight. Thanks
@sripadkulkarni
@sripadkulkarni 6 жыл бұрын
Wow you are a gem... need more people like u in the teaching field who have passion to educate people...I have decided to watch every lecture of yours irrespective of being relevant to my domain of work, I feel I can learn a lot of new things from you... lots of respects and love... thank you!!
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi kulkarni thank you very much. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@kalubaeliza4147
@kalubaeliza4147 Жыл бұрын
@@sundeepsaradhi thank you sir, well explained kindly sir am requesting a tutorial about Pluggable Authentication Modules (PAM) your positive response I will be highly appreciate💪💪💪
@Jatangi_Raju
@Jatangi_Raju 2 жыл бұрын
i am cleared all my subjects by watching your videos.......its a small word but, thank you so much sir.😊😊😊😊
@sTadelaSanthoshi
@sTadelaSanthoshi Жыл бұрын
Thank you so much sir. I was very fear about this topic but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us.............. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
@attitudeboy2840
@attitudeboy2840 Жыл бұрын
Thank you for your valuable information ✨✨.. This video.. your video.. ofter 5 years also still... Giving.. Knowledge.. for US... Thank you...❤
@sagarsoni1033
@sagarsoni1033 5 жыл бұрын
you are gem... I love your teaching style
@maheshb3756
@maheshb3756 3 жыл бұрын
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
@someone1ben
@someone1ben 5 жыл бұрын
First Indian Video I never skipped.
@sundeepsaradhi
@sundeepsaradhi 5 жыл бұрын
Hi Very nice to see your comment and thanks for your support towards our channel.
@a.yashwanth
@a.yashwanth 3 жыл бұрын
36:00 there is no need to encrypt hash code separately as the entire plain text and hash are encrypted using the key only known to those 2 people. You encrypt the hash code only when the message is sent in plain text format because anyone can modify the PT and recompute the hash code and the receiver doesn't know if the hash is not encrypted.
@279aishwaryavallala7
@279aishwaryavallala7 5 жыл бұрын
superb teaching sir am following your lecturs for network security the explaination is very simple and easy to understand simply superb........Thank you very much sir
@crazyanonymous8393
@crazyanonymous8393 5 жыл бұрын
Superb teaching iever seen thisi type of techning..
@utsavseth7116
@utsavseth7116 Жыл бұрын
Beautifully explained
@sinekas790
@sinekas790 10 ай бұрын
Thank you sir your teaching is very well
@md.mehedihasan8324
@md.mehedihasan8324 5 жыл бұрын
Sir , Excellent Lecture..
@mehranehk8784
@mehranehk8784 3 жыл бұрын
Great explanation thanks
@gopinathpanda5889
@gopinathpanda5889 5 жыл бұрын
sir I have a doubt in hash code. in case-2 of hash code the hash code was decrypted by public key of A.Which is available for all users and anyone can decrypt it.there is no use of private key.How this can be achieved.
@scatteringparameters.4167
@scatteringparameters.4167 3 жыл бұрын
Genius ⚡⚡⚡
@shehabthabit4395
@shehabthabit4395 2 жыл бұрын
Great teacher sir!.. thank you so much... very nice explanation
@HK-sw3vi
@HK-sw3vi 2 жыл бұрын
Thanks a bunch, this made things clear
@rajmangukiya114
@rajmangukiya114 5 жыл бұрын
fab video sir thanku
@deepar3850
@deepar3850 2 жыл бұрын
Thank you so much sir😊😊very much useful🙂
@pranavitykyala7887
@pranavitykyala7887 4 жыл бұрын
neat and crystal clear explanation...
@hectoralfonso5168
@hectoralfonso5168 3 жыл бұрын
Easy way to understand, thanks teacher
@karnansooriyakumar8002
@karnansooriyakumar8002 4 жыл бұрын
Thank you so much sir i got clear idea about types of authentication
@tejasreechintada8324
@tejasreechintada8324 3 жыл бұрын
Thankyou for your explanation sir 😅
@zeynepgul551
@zeynepgul551 3 жыл бұрын
Great video, sir. Thank you so much!
@munagaladivya236
@munagaladivya236 6 жыл бұрын
Nice vedio I understud every thing WT u r explained
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi divya thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
@SachinKumar-kd2fr
@SachinKumar-kd2fr 6 жыл бұрын
Nicely explained Sir
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi sachin thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@amar.mishraamar.mishra9536
@amar.mishraamar.mishra9536 6 жыл бұрын
Great Sir.
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi amar thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@rahulsmarty1648
@rahulsmarty1648 5 жыл бұрын
U r great sir....tnq u for helping me in examination by these Vedio...tnq u soo much sir.
@sagnikchakraborty165
@sagnikchakraborty165 6 жыл бұрын
sir in case of hash function can't we encrypt the hash code using secret key i mean symetric key cryptography technique?
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi chakraborty of course you can encrypt the hash code with secret key and the same should reflected on receivers side.
@everythinguneed__1721
@everythinguneed__1721 4 жыл бұрын
thank you sir you are the best
@pnkjthapliyal
@pnkjthapliyal 5 жыл бұрын
simply great .thanks for the lecture.
@musabello2315
@musabello2315 Жыл бұрын
❤ god bless you more
@sadaffatima2076
@sadaffatima2076 5 жыл бұрын
Very nice
@vineetkumar03
@vineetkumar03 5 жыл бұрын
Great Sir Please share the SHA 3 Algo As soon as possible.
@Optimistic_aspirant
@Optimistic_aspirant 5 жыл бұрын
Thank you sir...ur videos were of great use ...
@user-ic3fh6ru3g
@user-ic3fh6ru3g 4 жыл бұрын
superb
@rajujoseph2948
@rajujoseph2948 5 жыл бұрын
EXCELLENT VIDEO
@a.yashwanth
@a.yashwanth 3 жыл бұрын
26:00 if we want only authentication, then what's the point of encrypting the plain text. Only encrypting the MAC is enough. If someone wants to change the PT then he cannot recalculate the MAC and modify it as he won't have the key to encrypt it. edit: oh, that's what hash functions do.
@divyahoney4687
@divyahoney4687 6 жыл бұрын
Good explanation sir tq soooo much
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi divya thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@DuuAlan
@DuuAlan 6 жыл бұрын
Mate, you are awesome
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi alan thanks for your interest and support towards our channel.
@amreshpathak6508
@amreshpathak6508 5 жыл бұрын
Great explanation sir I appreciate it
@Ok_dikshu
@Ok_dikshu 6 жыл бұрын
Super ga cheptunaru sir
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi jhansi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@dr.shemalatha7636
@dr.shemalatha7636 5 жыл бұрын
excellent explanation sir.
@The123bunjy
@The123bunjy 5 жыл бұрын
Sir, your teaching is really very good, understandable. Please sir also make a separate video for has function, universal hashing and also perfect hashing also.
@raghavagarwal6734
@raghavagarwal6734 5 жыл бұрын
Well done! U have explained well!
@rohitsain13
@rohitsain13 6 жыл бұрын
nice work ..
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi Rohit thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@mrsrujana6079
@mrsrujana6079 5 жыл бұрын
Sir please explain s/mime and pgp format. Tomorrow is my exam. I am hoping that u will upload it soon .Thank you :)
@dhananjaychobhe1844
@dhananjaychobhe1844 5 жыл бұрын
18:11 MAC
@paritagojariya5300
@paritagojariya5300 5 жыл бұрын
Great Video..!
@essarshed5197
@essarshed5197 4 жыл бұрын
thank you sir great session
@lordalbusseveruspotter914
@lordalbusseveruspotter914 5 жыл бұрын
GREAT EXPLANATION
@snigdhashingade6097
@snigdhashingade6097 5 жыл бұрын
thank you, sir ......... great video!!
@meet.patel18
@meet.patel18 4 жыл бұрын
30:00 hash function
@vishavgupta3717
@vishavgupta3717 5 жыл бұрын
Excellent Sir
@kamathprajna
@kamathprajna 2 жыл бұрын
Thank you sir
@anmaraljanabi7137
@anmaraljanabi7137 4 жыл бұрын
Many thanks for sharing :)
@venkireddy64
@venkireddy64 3 жыл бұрын
When r u planning to add other videos in this series sir You are doing awesome job
@ManeshThankappan
@ManeshThankappan 5 жыл бұрын
Sir. Your classes are excellent. Good to polish fundamentals. Could u give me examples (names) of some algorithm for 2nd and 3rd methods( for Message Authentication Codes and Hash Codes).
@rohithmallampalli5930
@rohithmallampalli5930 5 жыл бұрын
nice explanation sir
@ashidevkc9003
@ashidevkc9003 5 жыл бұрын
great one
@PreetiSingh-ko7dm
@PreetiSingh-ko7dm 5 жыл бұрын
can u plz..tell me real workd example...... email id can be an example of second case in messsage encryption?
@saldi3543
@saldi3543 5 жыл бұрын
Big Big Like Thank you
@NareshKumar-bl3sy
@NareshKumar-bl3sy 6 жыл бұрын
Very Nice Lecture Sirji !! Grand Salute!!!
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi naresh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@ruthvikrajam.v4303
@ruthvikrajam.v4303 5 жыл бұрын
super
@BugsBunny071
@BugsBunny071 5 жыл бұрын
i rarely comment on tutorials but this one was really really good.
@isha_ch23
@isha_ch23 Жыл бұрын
Thank you
@syedrashidalishah4646
@syedrashidalishah4646 6 жыл бұрын
keep it up
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi syed thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@mubashareenahmad2404
@mubashareenahmad2404 4 жыл бұрын
What are the authentication functions (c) and hash functions (h) we are applying for the plaintext ?
@sundeepsaradhi
@sundeepsaradhi 4 жыл бұрын
hi here the Receiver should know whether the received message is sent from valid and authorized user and this process is called authentication and also the message should not be altered during the transmission and this process is called Integrity. In order to achieve authentication and integrity we will use authentication and hash functions. Hope your doubt has been clarified.
@Michelle-rb6nl
@Michelle-rb6nl 2 жыл бұрын
thank you!🤯
@zohebhasan2940
@zohebhasan2940 6 жыл бұрын
Thanks
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi hasan thanks for watching my sessions and interest towards our channel.
@anaganisaiteja9061
@anaganisaiteja9061 5 жыл бұрын
GURUJI U RRRRRRRRR GREATTTTTTTT
@thedifferent7562
@thedifferent7562 4 жыл бұрын
I'm confused...you said no key for hash but in the last type of hash function you have used key for both the hash code and the message... please explain :/
@sundeepsaradhi
@sundeepsaradhi 4 жыл бұрын
Hi In order to generate hash code we need not use of key on plain text but for acheiving the confidentiality we will encrypt the plain text along with hash code. Hope your doubt has been clarified.
@shashankgarg4997
@shashankgarg4997 6 жыл бұрын
How does the receiver get to know the MAC code that was applied so that it can it can be compared with the senders MAC?
@prajjwaltiwari2564
@prajjwaltiwari2564 4 жыл бұрын
Great video sir... Sir could u pls explain DES n AES with an example Or its implementation...
@sriharshagade111
@sriharshagade111 5 жыл бұрын
please complete the playlist. It will be very helpful
@sudhanshujha5408
@sudhanshujha5408 4 жыл бұрын
Sir can you please tell how come the authentication is achieved in 3rd case of message encryption because there reciever is not recognised by the sender and as you say for authentication both should recognise each other so it fails as per that concept🙄
@arian7472
@arian7472 5 жыл бұрын
just can you correct me if iam worng hash function is md5 , sha , hmac the first one without shared secret key is md5 or sha the second one with using shared key is hmac
@gandesirisrikanth9001
@gandesirisrikanth9001 Жыл бұрын
Hello sir please post the types of firewalls video
@BrijeshYadav-vl7bj
@BrijeshYadav-vl7bj 6 жыл бұрын
Nice lecture Sundeep.
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi Brijesh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@web-university
@web-university 6 жыл бұрын
very nice
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi harsha thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@ashwinir5110
@ashwinir5110 3 жыл бұрын
In MAC method, how k1,k2 are exchanged
@narayananbhooma8566
@narayananbhooma8566 4 жыл бұрын
hello sir,you are saying that hash is independent of key,but in second case your are using secret key for the encryption of the whole message,why?
@Sourav9835
@Sourav9835 5 жыл бұрын
How the secret key will be generated and shared between sender and receiver
@sharonrosy9519
@sharonrosy9519 5 жыл бұрын
Tq sir
@prakashghimire8996
@prakashghimire8996 6 жыл бұрын
Sir What are the types of authentication services and techniques of authentication?
@kamalajashet5611
@kamalajashet5611 6 жыл бұрын
sir will you please explain RC6 and Cast 128 algorithms.. ?
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi kamalaja definitely i will try to upload them soon.
@rajeekarthikeyan
@rajeekarthikeyan 5 жыл бұрын
U said that Hash functions does not use Keys.Then Why did u Use Public key and Privatekey for encryption
@ramaraog4630
@ramaraog4630 6 жыл бұрын
Good sir kindly reveal another topics of network security like rc4,linear crypt analysis and different crypt analysis ,blow fish, except alog
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi rama rao thanks for your interest towards my sessions and soon i will upload them.
@chsaidattapavanbalaji7996
@chsaidattapavanbalaji7996 4 жыл бұрын
Thankyou Sir
@shashikantupadhyay4818
@shashikantupadhyay4818 5 жыл бұрын
God bless you
@madhusudhana262
@madhusudhana262 5 жыл бұрын
can you make a video on lamport authentication scheme?
@muhammadrehanahmed3611
@muhammadrehanahmed3611 4 жыл бұрын
👍
NETWORK SECURITY - SHA 512 (AUTHENTICATION ALGORITHM)
42:16
Sundeep Saradhi Kanthety
Рет қаралды 219 М.
Look at two different videos 😁 @karina-kola
00:11
Andrey Grechka
Рет қаралды 10 МЛН
Smart Sigma Kid #funny #sigma #memes
00:26
CRAZY GREAPA
Рет қаралды 19 МЛН
Вы чего бл….🤣🤣🙏🏽🙏🏽🙏🏽
00:18
Bony Just Wants To Take A Shower #animation
00:10
GREEN MAX
Рет қаралды 6 МЛН
AES: How to Design Secure Encryption
15:37
Spanning Tree
Рет қаралды 157 М.
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 337 М.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
Transport Layer Security (TLS) - Computerphile
15:33
Computerphile
Рет қаралды 475 М.
HMAC explained | keyed hash message authentication code
6:33
Jan Goebel
Рет қаралды 67 М.
How does AES encryption work? Advanced Encryption Standard
12:50
Programming w/ Professor Sluiter
Рет қаралды 109 М.
Look at two different videos 😁 @karina-kola
00:11
Andrey Grechka
Рет қаралды 10 МЛН