Тёмный

Hash function based on CBC in cryptography | Hash function based on cipher block chaining 

Chirag Bhalodia
Подписаться 19 тыс.
Просмотров 19 тыс.
50% 1

Опубликовано:

 

13 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 13   
@ChiragBhalodia
@ChiragBhalodia 3 года назад
Follow my blog: www.chiragbhalodia.com/2021/10/hash-function-based-on-cbc.html
@shivamtyagi9936
@shivamtyagi9936 3 года назад
Sir ur content is real gold. Ur channel one of most underrated channel. U should add #information and netwok security in thumbnail ....ur playlist cant be shown til i type "ins". Ur views will increase exponentially. I know u might not read this. Tnku for concept based teaching
@ChiragBhalodia
@ChiragBhalodia 3 года назад
Noted dear ...... Thank you for suggestion.... Share with others.... Subscribe my channel....
@ChiragBhalodia
@ChiragBhalodia 3 года назад
Most IMP for tomorrow examination : All cipher techniques,active and passive attack, des, aes, diffie Hellman, rsa, application of digital signature, kerberos, DSA, public key distribution, hmac, all block cipher modes, ssh, SSL.....Share with others....
@earthsmostinterestingmante4756
@earthsmostinterestingmante4756 3 года назад
Smart. Wow
@ChiragBhalodia
@ChiragBhalodia 2 года назад
Follow my blog: www.chiragbhalodia.com/2021/10/hash-function-based-on-cbc.html
@incoming.camera
@incoming.camera Год назад
RTU GUYS ATTENDANCE
@ChiragBhalodia
@ChiragBhalodia Год назад
Please share with others... Please subscribe my channel...!!! Please follow my blog: chiragbhalodia.com
@sandeepsarangal3747
@sandeepsarangal3747 4 года назад
Hi Sir, Is this same if we want to build a hash function using block cipher, for example AES...
@ChiragBhalodia
@ChiragBhalodia 4 года назад
Dear AES is symmetric cipher... It provides only confidentiality... But using hash function we can achieve confidentiality, integrity and authenticity based on their different application.... But you want to apply hash function in AES.... You can do it... It is combination of public and private key cryptography...
@sandeepsarangal3747
@sandeepsarangal3747 4 года назад
@@ChiragBhalodia It went over my head little bit...Please clarify little bit..
@ChiragBhalodia
@ChiragBhalodia 4 года назад
@@sandeepsarangal3747 AES is symmetric cipher algorithm....All symmetric cipher algorithm provide confidentiality only.... Hash function provides Integrity and Authentication based on their application (Why its based on application??? If you modify some strategy then hash function also provide confidentiality but basic purpose of hash function is to serve authnetication and integrity over confidentiality.) Now as per your query, you want to apply hash function over AES.. Yes, You can apply... I hope, You are knowing about Message authentication code (MAC). it is alsmsot same to hash function...or MAC is also calle keyed hash function. Here I provide one video about MAC, which is MAC based on block cipher....In this video, I have covered MAC is applied in AES, DES, Triple DES etc... So, We also can apply hash function on all block cipher based symmetric algorithm (like AES and DES) MAC based on Block Cipher: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-usip-TmjfDQ.html Integrity, Authentication and Confidentiality: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-AJTJN4wDBM8.html Hash function application (which provide integrity, authentication and confidentiality over symmetric and asymmetric cipher technique): ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-KexR9ylLLcQ.html I hope, all your doubts are clear. If you still have any query, you can ask me.
@ChiragBhalodia
@ChiragBhalodia 2 года назад
Follow my blog: www.chiragbhalodia.com/2021/10/hash-function-based-on-cbc.html
Далее
ТИПИЧНОЕ ПОВЕДЕНИЕ МАМЫ
00:21
Просмотров 718 тыс.
다리찢기 고인물⁉️😱 Leg Splits Challenge
00:37
Cipher Block Chaining (CBC)
8:38
Просмотров 52 тыс.
#36 HMAC (Hash Based) & CMAC (Cipher Based)  |CNS|
8:10
How the MD5 hash function works (from scratch)
14:00
SHA: Secure Hashing Algorithm - Computerphile
10:21
Просмотров 1,2 млн
AES Round Transformation
11:04
Просмотров 70 тыс.
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40