#HashFunctions #Cryptography #NetworkSecurity #HashFunction #CryptographyAndNetworkSecurity message authentication • Authentication functio... MAC • MAC in Cryptography ||... hash function in Cryptography and network security
Bhai ajj abhi 4baje exam h and mujhe sab concept samjh mein aa raha h... thank you so much...but my bad mujhe pehle kyun nhi apka vdo Mila ...I can not complete all your videos because only 1hr left ...so thank you so much jitna bhi hua😊
Thank you so much, sir ....... I cleared 7 sem university exam subject which is Cryptography and network security.... your videos and your knowledge are helpful to me ....
Hash function me koi key nahi use hui h Key is only used after hame apna hashcode mil gyaa h after passing the msg throught the hash function And Ya to ham key encryption algo me use karre h to encrypt our msg I hope now samajh me agya hoga ✌️💯
bro i neeed answer of this question:- hashing is useful tool in (a)prevention of unauthorized file modification (b)the development of secure cryptography algorithm
abhishek bhaiya, cant we use hash function tied to cipher text ? just like u explained for MAC ? msg -> E with key (cipher text) -> H (h) -> append -> cipher text + h ab cipher text ko decrypt with key and hash ko compare kar do