Mac cryptography

Share on facebook
Share on twitter

Cryptography and Network Security - Message Authentication Code - GATE CSE

25 628 views | 7 Apr. 2018

The complete YouTube

The complete YouTube playlist can be viewed here: https://goo.gl/mjyDev

This lesson explains the concept of Message Authentication Code, under the course, "Cryptography and Network Security for GATE Computer Science Engineering".

The lesson explains the questions on the following subtopics:

Message Authentication Code

Message Authentication Code - for Authentication

Message Authentication Code - for Authentication and Confenditiality

Some important terminology and concepts are also illustrated, for the better understanding of the subject.

For the entire course: https://goo.gl/aTMBNZ

For more lessons by Ansha Pk: https://goo.gl/2DX9Wn

Must watch for all the GATE/ESE/PSU Exams.

Download the Unacademy Learning App from the Google Play Store here:- https://goo.gl/02OhYI

Download the Unacademy Educator app from the Google Play Store here: https://goo.gl/H4LGHE

Do Subscribe and be a part of the community for more such lessons here: https://goo.gl/UGFo7b

Visit Our Facebook Group on GATE here: https://goo.gl/cPj5sb

Cryptography and Network Security - Message Authentication Code - GATE(CSE) - Unacademy

Qais Hussainy

a bit confusion at the end but it was really good

Nic Gardin

Hello, at about 11:05 it seems as though you are applying the decryption algorithm (using key 1) to the entire Cipher + MAC file. Shouldn't the decryption only be applied to the Cipher portion? My reasoning is that applying the decryption to the whole Cipher + MAC file is pointless as the MAC is simply appended for message authentication (used for comparison) and has nothing to do with the plaintext message. Please let me know if I am wrong in my thought process. Otherwise, great video thank you for the clarification!



Kiran Kale

Ur isn't it sounds good ....??

Binny's platform

Mam that written matter ...While dictating the video should not be there we can't see the diagrams clearly due to the text that is written while you are saying the video

Qais Hussainy

thank you so much

Aathil Ahamed

Jezakallah for best explanation

ഷുഗർ വന്ന് മരിച്ച ഉറുമ്പ്

Thnx maam....??

Modepalli Bhargavi

Looking cute,but you can decrease the explanation time.try the simplest shortcuts,and short forms of subject.keep rocking.

AK creation status channel

Mam you are talk very fast and do not smaller time to understand for the user

Prathmesh Dhanawade

so nice, well explained!!!
Thank you.

Vishal Rajput

You could've made it a lot shorter, people are looking for short videos these days having the same knowledge. Anyways that was good

mayur gupta

Thanks for all the valuable videos i want to tell something i like your way at the starting of every video when you say the word Channel you should continue this way because this is so cute

sarthak verma

gazab ka content h

Lauris Skraucis

Really nice tutorial, thank you! :)

Rizwan Ali

Hello me

InnAllaahaa Ma' As' Saabireen

اللَّهُمَّ صَلِّ وَسَلِّمْ عَلَى نَبَيِّنَا مُحَمَّدٍ ﷺ وَعَلىٰ آلِهِ (مـا أنـا عـلـيـه و أصـحـابـي) وَصَحْبِهِ وَسَلِّمْ تَسْلِيمًا كَثِيرًا ﷺ
( إِنَّ اللَّهَ وَمَلَائِكَتَهُ يُصَلُّونَ عَلَى النَّبِيِّ يَا أَيُّهَا الَّذِينَ آمَنُوا صَلُّوا عَلَيْهِ وَسَلِّمُوا تَسْلِيماً) سورة الأحزاب Verse 56

Jazakallah khair

Priyansh Gupta

ma'am what is difference between data confidentiality and data availability ??(main difference)

Md Naushad


Muhammad Safnad

(authentication tied to cipher text) i couldn't understood . what was it mean

shashank tripathi

fuck so fast cant able to get

Maths Online Badi


sriram k

superb every video


I love you baby

Mac cryptography

Share on facebook
Share on twitter

Cryptography MACs Based On PRFs

654 views | 19 Aug. 2016

Cryptography MACs Based On

Cryptography MACs Based On PRFs

To get certificate subscribe: https://www.coursera.org/learn/crypto


Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWYosqucluZghEVjUkopdD1e


About this course: Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.

Mac cryptography

Share on facebook
Share on twitter

cryptography - HMAC

34 542 views | 31 Aug. 2016


To get certificate subscribe: https://www.coursera.org/learn/cryptography


Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWb07OLBdFI2QIHvPo3aTTeu


Youtube channel: https://www.youtube.com/user/intrigano




loathing subversion

damn that forehead is tense

Marketta Leeanne

The safest messenger in utopia

Junk Name

I don't understand why you say SHA-3 is not good for HMAC at t=10:00. How come?

Mitra Ehud-Dray

at the end of the video you say that in the next video you would show the joint goal of authenticated encryption, can you link to that video ? i cant find it...

Sindhu Chinniah

Nice.Thank you.

Christine Hill

This video is horribly confusing and boring. I have no idea what the fuck you're talking about.

Emilio Sitael

ala mientras!, que interesante

gran video bro.