The complete YouTube
The complete YouTube playlist can be viewed here: https://goo.gl/mjyDev
This lesson explains the concept of Message Authentication Code, under the course, "Cryptography and Network Security for GATE Computer Science Engineering".
The lesson explains the questions on the following subtopics:
Message Authentication Code
Message Authentication Code - for Authentication
Message Authentication Code - for Authentication and Confenditiality
Some important terminology and concepts are also illustrated, for the better understanding of the subject.
For the entire course: https://goo.gl/aTMBNZ
For more lessons by Ansha Pk: https://goo.gl/2DX9Wn
Must watch for all the GATE/ESE/PSU Exams.
Download the Unacademy Learning App from the Google Play Store here:- https://goo.gl/02OhYI
Download the Unacademy Educator app from the Google Play Store here: https://goo.gl/H4LGHE
Do Subscribe and be a part of the community for more such lessons here: https://goo.gl/UGFo7b
Visit Our Facebook Group on GATE here: https://goo.gl/cPj5sb
Cryptography and Network Security - Message Authentication Code - GATE(CSE) - Unacademy
a bit confusion at the end but it was really good
Hello, at about 11:05 it seems as though you are applying the decryption algorithm (using key 1) to the entire Cipher + MAC file. Shouldn't the decryption only be applied to the Cipher portion? My reasoning is that applying the decryption to the whole Cipher + MAC file is pointless as the MAC is simply appended for message authentication (used for comparison) and has nothing to do with the plaintext message. Please let me know if I am wrong in my thought process. Otherwise, great video thank you for the clarification!
Ur isn't it sounds good ....??
Mam that written matter ...While dictating the video should not be there we can't see the diagrams clearly due to the text that is written while you are saying the video
Cryptography MACs Based On
Cryptography MACs Based On PRFs
To get certificate subscribe: https://www.coursera.org/learn/crypto
Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWYosqucluZghEVjUkopdD1e
About this course: Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.
To get certificate subscribe: https://www.coursera.org/learn/cryptography
Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWb07OLBdFI2QIHvPo3aTTeu
Youtube channel: https://www.youtube.com/user/intrigano
damn that forehead is tense
The safest messenger in utopia
I don't understand why you say SHA-3 is not good for HMAC at t=10:00. How come?
at the end of the video you say that in the next video you would show the joint goal of authenticated encryption, can you link to that video ? i cant find it...