No video

NETWORK SECURITY - MD5 ALGORITHM

  Рет қаралды 135,162

Sundeep Saradhi Kanthety

Sundeep Saradhi Kanthety

6 жыл бұрын

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.
Step 1. Append Padding Bits. The message is "padded" (extended) so that its length (in bits) is congruent to 448, modulo 512. ...
Step 2. Append Length. ...
Step 3. Initialize MD Buffer
Step 4. Process Message in 16-Word Blocks. ...
Step 5. Output.

Пікірлер: 119
@bhavukkalra1786
@bhavukkalra1786 4 ай бұрын
The only good, correct and concise explanation of MD5 on youtube.
@rahulshakya9864
@rahulshakya9864 4 жыл бұрын
Hello sir, I am a student in IIT. You explain far better than my faculty. Thank you so much for the video.
@vm3699
@vm3699 3 жыл бұрын
Hey bro , if you have some pdf of your study material can you please send it to me .
@rishith4346
@rishith4346 10 ай бұрын
​@@vm3699Yeah , send me your mail id
@lloydvasser4889
@lloydvasser4889 3 жыл бұрын
This is the most helpful video on the internet about MD5. Well done and thanks!
@henriquekrever160
@henriquekrever160 3 жыл бұрын
Bruh, you have the gift of explaining things and making them easy, nicely done!
@ambarishkanagarajah8600
@ambarishkanagarajah8600 5 жыл бұрын
your all videos really helpful sir...its clear and good 👍👍👍👍👍👍👍👍👍👍👍
@reddaboinavivek7494
@reddaboinavivek7494 6 жыл бұрын
Sir kudos to you.Your explanation is Crystal clear.Just one advice try to cut down the video length by avoiding the repetition I Know that repetition makes viewers learn better but some people try to avoid seeing the video just by it's length.I was one of them.After seeing your videos I understood how great your videos are.
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi vivek thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@reddaboinavivek7494
@reddaboinavivek7494 6 жыл бұрын
Sundeep Saradhi Kanthety sure
@deepak_bansal
@deepak_bansal 6 жыл бұрын
correct
@subramanianradhakrishnan7009
@subramanianradhakrishnan7009 4 жыл бұрын
in 18:21 min we store computed value at buffer b (B=B+(A+G(B,C,D)+x[k]+t[i]
@bhavukkalra1786
@bhavukkalra1786 4 ай бұрын
I also noticed the same, The block diagram at the end is correct. The text written on screen is wrong!
@RahulSalunkheShivaSanskar
@RahulSalunkheShivaSanskar 3 жыл бұрын
what books can we read to understand all the encryption algorithms deeply?
@kiransb252
@kiransb252 2 жыл бұрын
Iam ur regular youtube student, i apprucuate for ur great effort and knowledge.
@sajanvethakumar7982
@sajanvethakumar7982 6 жыл бұрын
very nice explanation,Thank you for your in depth presentation about MD5
@jaishriharivishnu
@jaishriharivishnu Ай бұрын
finally got a satisfactory explaination
@preethiyr4525
@preethiyr4525 3 жыл бұрын
Thank you so much sir for clean & neat explaination of MD5. Sir can you please explain the "Tiger Hash algorithm". This topic is bit confusing to understand.
@superliggolleri6050
@superliggolleri6050 7 ай бұрын
you literally couldnt tell it better you're the best
@saitejasaiteja7290
@saitejasaiteja7290 Жыл бұрын
you are very genious
@mehekalinaik3854
@mehekalinaik3854 3 жыл бұрын
His efforts👏👏
@senthilkumaran5317
@senthilkumaran5317 5 жыл бұрын
Thanks for the english explanation 👍
@sunnymaymeowmeowmeow
@sunnymaymeowmeowmeow 6 жыл бұрын
thank you very much! very clear explanation. I wonder for X[k], how to determine which part of the plaintext (k) will be modified? Thank!
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi sunny thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@ManishSinghh40
@ManishSinghh40 5 жыл бұрын
Thanks sir! You explain very nicely.
@tech_channel110
@tech_channel110 9 ай бұрын
very well explanied
@ydeepak73
@ydeepak73 6 жыл бұрын
Nicely explain. Thanks
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi deepak thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@gouravkumarshaw417
@gouravkumarshaw417 Жыл бұрын
Nice
@padalatejasaikumarreddy5321
@padalatejasaikumarreddy5321 3 жыл бұрын
sir you are my god
@georgessader4045
@georgessader4045 5 жыл бұрын
what a veryyyy nice explanation! thank you.
@malikadabare3719
@malikadabare3719 5 жыл бұрын
Thank you very much. Very well explanation
@shruthiesridhar6514
@shruthiesridhar6514 5 жыл бұрын
very clear explanation.
@sarathsabu4486
@sarathsabu4486 3 жыл бұрын
Nice.. very useful:)... thanks
@jabskyoutube5532
@jabskyoutube5532 4 жыл бұрын
thank you very much sir. so helpful.
@ujithisura355
@ujithisura355 6 жыл бұрын
Nicely explained.. thank you
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi Ujith thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@feliciaoyeyinka3500
@feliciaoyeyinka3500 4 жыл бұрын
Hello Sundeep Saradhi Kantheety, good lecture, great explanantion. This really help me in my research but what is the difference in using MD5 and AES as cloud authentication tool. How do I evaluation this MD5 in terms of the confidentiality, integrity and availability.
@dhavaldl3618
@dhavaldl3618 5 жыл бұрын
I think, at 18:17, there should be 'B' in left side of formula as you have shown on figure at 28:17.
@bhavukkalra1786
@bhavukkalra1786 4 ай бұрын
You are correct!
@rajdave9862
@rajdave9862 3 жыл бұрын
Bhala ho Aapka sir, thanks 👍😊
@shilpijain4668
@shilpijain4668 6 жыл бұрын
Thank you so much sir
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi Shilpi Jain thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@ramakanthreddykowdampalli4345
@ramakanthreddykowdampalli4345 6 жыл бұрын
Good Explanation...
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi ramakanth thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@pratyushranjan150
@pratyushranjan150 3 ай бұрын
thank you now it is good
@ruchitfuria5428
@ruchitfuria5428 5 жыл бұрын
nicely explained sir.
@rahulp9409
@rahulp9409 4 жыл бұрын
COULD YOU PLEASE UPLOAD ABOUT ELLIPTIC CURVE CRYPTOGRAPHY
@sajiththalasseriparambil5676
@sajiththalasseriparambil5676 6 жыл бұрын
thank you sir
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi sajith thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@lavanyamukka5597
@lavanyamukka5597 4 жыл бұрын
Let us consider a case where the user sends a text or file from his phone to his friend. the risk of data being accessed by a third party is high when the data enters the cloud platform. hence a new method to secure the messages/file is to done either by building a new algorithm or by modifying the existing one which can give more security and consume less time. the identity of the user must also be verified by using the authentication, verification and validation methodologies. Sir, can you give explanation for this which type of algorithm i should use.
@deepaksd2790
@deepaksd2790 5 жыл бұрын
Super sir and thank you very much
@vigneshkumar5159
@vigneshkumar5159 5 жыл бұрын
Nice lecture 👏
@shubhiagrawal9540
@shubhiagrawal9540 2 жыл бұрын
What is plain text? Can you please tell me. And can you please tell me what we will do with 16 32-bit word which was generated in step4 in step5?
@sangeethasenthilkumar4446
@sangeethasenthilkumar4446 5 жыл бұрын
Sir, Good explanation. What is the value of 'S' used in circular left shift. Is the value 'A'' calculated and assigned to 'B' and similarly 'B' to 'C' and 'C' to 'D' and 'D' to 'A'.. Why it is so.
@rushwilliams2152
@rushwilliams2152 Жыл бұрын
There's 20+ websites & videos that explain MD5 conceptually with diagrams and functions, but not one simple example. How about taking the words "Hello World", turning it into bits, and show each step to get "ed076287532e86365e841e92bfc50d8c" as the hash?
@MeoMania49
@MeoMania49 4 жыл бұрын
sir, can you tell about the pros and cons of MD5 algorithm,thanks in advance
@bhavyakukkar
@bhavyakukkar 4 жыл бұрын
One con is that it is pretty much broken now, many websites exist on Google with the hashed codes listed next to the the respective passwords. Sha-2 is considered the standard hashing algorithm now
@srinikethvelivela9877
@srinikethvelivela9877 3 жыл бұрын
And not all sha-2 some of them similar to md5 are vulnerable to length extention, birthday attacks so only sha-256 or above variates are secure right now
@revinraj100
@revinraj100 4 жыл бұрын
Hi Anna, I am from digital forensic background, and I am going to do my CHFI, I have a topic call windows forensics. There is where MD5 comes in... I understand st3p 1 and 2 3 and 4 I don’t eat it... can you break it down for me
@momog1702
@momog1702 3 жыл бұрын
Hello sir im new in network security but i have a question how do you make the 512 bits be stored in the buffers that only have 32 bits each buffer
@arunkumararun1517
@arunkumararun1517 3 жыл бұрын
SHA 512 and one SHA operation These two are same or different Please reply as soon as possible sir I am waiting for your answer
@vishnuvineeth6135
@vishnuvineeth6135 5 жыл бұрын
U R Awesome Sir
@srinivasr3893
@srinivasr3893 8 ай бұрын
Hello Sir, wats s in circular left shift?
@sherwtfaris
@sherwtfaris 5 жыл бұрын
Thank you so much!!
@pavanisrivatsav3254
@pavanisrivatsav3254 6 жыл бұрын
How is the part of plain text choosen ..is it same as SHA?? and what is the value of s in shift operation
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi pavani plain text is choosen same as we have done in SHA algorithm. s can be any bits but same should be used while decryption. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@vikki153
@vikki153 5 жыл бұрын
sir what is addition modulo? can u please explain and it will be better if you can give one practical example after explaining a theoretical concept... It becomes easier to relate.... the lectures are great and easy to understand otherwise.
@adityagawhale
@adityagawhale 5 жыл бұрын
Please make a video on Galois Fields and Elliptic Curve Cryptography
@isaigm
@isaigm Жыл бұрын
Coding this in C: 😀 in VHDL: 💀
@rn1360
@rn1360 3 жыл бұрын
Can please describe how apply addtion modulo 2^32
@ramyapolisetty6799
@ramyapolisetty6799 4 жыл бұрын
Why you will use 512 bits You also take 265bits, 192 bits etc... This only my doubts pls clarify
@RkMusicEventsSurat
@RkMusicEventsSurat 5 жыл бұрын
Hello sir. There is another diagram of MD5 in book. Today was my exam. N I learned from your video. So I draw the md5 which I learned here. So is it same or different? Your md5 algorithm n my book's md5???
@sundeepsaradhi
@sundeepsaradhi 5 жыл бұрын
Hi don't worry diagram in our video is correct and it was from reference book WILLIAM STALLINGS. so definitely you will be getting good score. All the best
@RkMusicEventsSurat
@RkMusicEventsSurat 5 жыл бұрын
Thank you so much sir. You doing great work. 🙏
@joshw8868
@joshw8868 Жыл бұрын
at 21:14, what the the "⌄" symbols stand for?
@bilawalshabir5334
@bilawalshabir5334 5 жыл бұрын
means each individual round takes 128 bit of input....??
@ishitvaverma7381
@ishitvaverma7381 4 жыл бұрын
sir how the part of plain text is taken?? can you explain that part
@pratik_shah7
@pratik_shah7 4 жыл бұрын
Amazing!! Tysm
@brindas3693
@brindas3693 2 жыл бұрын
Any example sums for this md5 algorithm? Sir
@silkproduction
@silkproduction 5 жыл бұрын
thanks a lot!
@andalvenkatesan1249
@andalvenkatesan1249 5 жыл бұрын
Tq so much Sirr🙏🙏🙏
@sathishkumarr7106
@sathishkumarr7106 5 жыл бұрын
very nice
@mohammad.shahbaaz
@mohammad.shahbaaz 5 жыл бұрын
Fully satisfied
@Samtsjjsj
@Samtsjjsj 5 жыл бұрын
sir upload the source you used ...
@MrYOYOaman
@MrYOYOaman 5 жыл бұрын
what is 16 steps in reach round and T[1.....16]
@ermeenu10
@ermeenu10 5 жыл бұрын
Kindly send the link of these pictures also like constants and diagrams
@ravalapodipavani1701
@ravalapodipavani1701 2 жыл бұрын
Sir how to write logical function
@dipalidhonde8411
@dipalidhonde8411 6 жыл бұрын
sir what are the values of B,C and D??
@abdulrubbinmohsin6111
@abdulrubbinmohsin6111 2 жыл бұрын
Thanks for good explanation sir. My query is how much computing power it required for md5 for performing this entire task.
@hangchen
@hangchen 5 жыл бұрын
I love this cute guy at 6:50
@lakshmiraj5892
@lakshmiraj5892 3 жыл бұрын
Sir, may I get the link for SHA 1 algorithm
@yashgoswami7929
@yashgoswami7929 6 жыл бұрын
thanku sir
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi yash thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@shivamsingh-ds1lg
@shivamsingh-ds1lg 6 жыл бұрын
👍👍👍👍
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi shivam thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@donas8738
@donas8738 6 жыл бұрын
Sir what is path of plain text??
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi geethanjali plain text will be in form of bits.
@ervenaltares6405
@ervenaltares6405 4 жыл бұрын
Do you have the algorithm of md5 please send us please
@shivaprasad9876
@shivaprasad9876 6 жыл бұрын
Is there any use if we follow the education in this point of view, as per my knowledge if we don't have the implementation knowledge, the matter of studying is useless.
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
if you dont have the theoretical knowledge how can you implement that. so the basic working is most necessary for implementation. Tell me any thing which you have implemented with out knowing the procedure or algorithm.
@shivaprasad9876
@shivaprasad9876 6 жыл бұрын
But that should be in an understanding way sir, I couldn't understand some videos and some videos are exceptional
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
ok may i know which videos you didn't understood ?
@zc7078
@zc7078 4 жыл бұрын
you can hear a cat at about 7:25 :)
@vamsivanama8637
@vamsivanama8637 6 жыл бұрын
Sir please make a video on firewall and intruders
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi vamsi i feel those concepts are not much complex and easily understandable in the first reading so i just ignored them.
@dhachanamurthydhachanamurt8447
@dhachanamurthydhachanamurt8447 4 жыл бұрын
Tqq soooo much sir, such a awesome explanation sir,, great sirrrrrr.... No need to refer a text books sir
@NareshKumar-bl3sy
@NareshKumar-bl3sy 6 жыл бұрын
Sir, can we decrypt MD5 Digest??? if we know the process of encryption why cant we decrypt it by processing it in reverse order???
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi naresh yes but we didn't have any exact procedure for decryption ( may be due to security issues) so i think it is difficult. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@senthilkumaran5317
@senthilkumaran5317 5 жыл бұрын
No Message Digest is a hash code For every message transmission we will append this hash code to the sender's message. If any intruder makes any changes during the transmission the message digest will change. The receiver then calculates the message digest for the received message and then compares with the appended message digest if both were same no intrusion occurred else message has been modified. Hash code only tells about the integrity it does not provide any security over the transmission.
@Mayank612722
@Mayank612722 5 жыл бұрын
Sundeep Saradhi Kanthety you are not supposed to get message from hash. Only hash from message. This is property. Thanks
@arjun5458
@arjun5458 5 жыл бұрын
correct me if i am wrong,,,the thing is md5 is a hashing algo, rather than an encryption algo the sole purpose is to generate a -- hash number -- from the entire plain text, that changes its own value even if one bit in plain text changes and also designed such that the hash bits cannot be used to find the real plain text so reversing hash is computationally infeasible... and it is altogether encrypted i guess...
@sundeepsaradhi
@sundeepsaradhi 5 жыл бұрын
yes you are correct encryption algorithms are completely different from hash algorithms. Hash algorithms are used to generate Hash code in order to achieve integrity.
@shinedas77
@shinedas77 4 жыл бұрын
Great explanation..Sir I upgrading my our servers to Windows 2019 64bit. I have created a VB6 EXE which is using MD5 (code was copied from an ASP page to create the EXE).. But i shows " divisible by zero" error. could you advice please
@jyotinagwan6767
@jyotinagwan6767 Жыл бұрын
what is "s"?
@kishorekumar-tm5rg
@kishorekumar-tm5rg 5 жыл бұрын
Sha-1 algorithm plzz
@prateekchaudhary240
@prateekchaudhary240 6 жыл бұрын
Kya jhaat smjaya hai
@daisonraj9577
@daisonraj9577 5 жыл бұрын
Thanks sir
@vaishnavimanghat4576
@vaishnavimanghat4576 5 жыл бұрын
Thanks sir
NETWORK SECURITY - OVERVIEW OF CRYPTOGRAPHIC ALGORITHMS
12:06
Sundeep Saradhi Kanthety
Рет қаралды 29 М.
NETWORK SECURITY - SHA 512 (AUTHENTICATION ALGORITHM)
42:16
Sundeep Saradhi Kanthety
Рет қаралды 219 М.
小宇宙竟然尿裤子!#小丑#家庭#搞笑
00:26
家庭搞笑日记
Рет қаралды 31 МЛН
Bony Just Wants To Take A Shower #animation
00:10
GREEN MAX
Рет қаралды 6 МЛН
艾莎撒娇得到王子的原谅#艾莎
00:24
在逃的公主
Рет қаралды 41 МЛН
Fast and Furious: New Zealand 🚗
00:29
How Ridiculous
Рет қаралды 48 МЛН
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
MD5 Algorithm (working)
12:52
Study Table
Рет қаралды 13 М.
AES Explained (Advanced Encryption Standard) - Computerphile
14:14
Computerphile
Рет қаралды 1,2 МЛН
NETWORK SECURITY - HMAC ALGORITHM
20:58
Sundeep Saradhi Kanthety
Рет қаралды 147 М.
FEISTEL STRUCTURE IN NETWORK SECURITY || INFORMATION SECURITY
12:22
Sundeep Saradhi Kanthety
Рет қаралды 168 М.
小宇宙竟然尿裤子!#小丑#家庭#搞笑
00:26
家庭搞笑日记
Рет қаралды 31 МЛН