Тёмный

NETWORK SECURITY - TYPES OF AUTHENTICATION (Message Encryption, MAC, Hash Functions) 

Sundeep Saradhi Kanthety
Подписаться 622 тыс.
Просмотров 218 тыс.
50% 1

Three types of Authentications
1. Message Encryption
2. Message Authentication Code
3. Hash Functions.

Опубликовано:

 

31 янв 2018

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 164   
@redmuffler3186
@redmuffler3186 4 года назад
I had so many "Oooohhhh!!" moments during this. Thank you so much!
@jirilzala7573
@jirilzala7573 5 лет назад
Thank you so much sir. I was trying to understand this for last 3-4 hours but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
@gowthamiirao9010
@gowthamiirao9010 5 лет назад
well explained sir. I was confused with MAC and HASH and now its clear. thank you very much.
@webnetweaverwebnetweaver9185
@webnetweaverwebnetweaver9185 4 года назад
Very concise explanation. This is the best general explanation of application security methods I've seen. Many thanks to you for this!
@kashmirinsights6597
@kashmirinsights6597 6 лет назад
Great Video ...First Time In my 4 Years I have Commented Any Tutorial ...Your A Gem
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi Thanks for your interest towards our channel and your support towards our channel.
@iEntertainmentFunShorts
@iEntertainmentFunShorts 5 лет назад
Waw awwsome...sir if you guys coming after reading books either kurose and ross or fourozen this is best lecture you found go for it with 1.25× speed.Tq sir
@sagarsoni1033
@sagarsoni1033 5 лет назад
you are gem... I love your teaching style
@pnkjthapliyal
@pnkjthapliyal 5 лет назад
simply great .thanks for the lecture.
@sTadelaSanthoshi
@sTadelaSanthoshi Год назад
Thank you so much sir. I was very fear about this topic but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us.............. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
@zeynepgul551
@zeynepgul551 3 года назад
Great video, sir. Thank you so much!
@crazyanonymous8393
@crazyanonymous8393 5 лет назад
Superb teaching iever seen thisi type of techning..
@mayankbhagat4154
@mayankbhagat4154 5 лет назад
Sir your lectures were really very helpful. You are an outstanding teacher. I would like to suggest that after explaining each of the authentication methods or cipher algorithms you should have explained their advantages and disadvantages. That would have given us more insight. Thanks
@279aishwaryavallala7
@279aishwaryavallala7 5 лет назад
superb teaching sir am following your lecturs for network security the explaination is very simple and easy to understand simply superb........Thank you very much sir
@Jatangi_Raju
@Jatangi_Raju 2 года назад
i am cleared all my subjects by watching your videos.......its a small word but, thank you so much sir.😊😊😊😊
@attitudeboy2840
@attitudeboy2840 Год назад
Thank you for your valuable information ✨✨.. This video.. your video.. ofter 5 years also still... Giving.. Knowledge.. for US... Thank you...❤
@garima3331
@garima3331 5 лет назад
Great teacher sir!.. thank you so much... very nice explanation
@someone1ben
@someone1ben 5 лет назад
First Indian Video I never skipped.
@sundeepsaradhi
@sundeepsaradhi 5 лет назад
Hi Very nice to see your comment and thanks for your support towards our channel.
@maheshb3756
@maheshb3756 3 года назад
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
@raghavagarwal6734
@raghavagarwal6734 5 лет назад
Well done! U have explained well!
@sripadkulkarni
@sripadkulkarni 6 лет назад
Wow you are a gem... need more people like u in the teaching field who have passion to educate people...I have decided to watch every lecture of yours irrespective of being relevant to my domain of work, I feel I can learn a lot of new things from you... lots of respects and love... thank you!!
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi kulkarni thank you very much. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@kalubaeliza4147
@kalubaeliza4147 Год назад
@@sundeepsaradhi thank you sir, well explained kindly sir am requesting a tutorial about Pluggable Authentication Modules (PAM) your positive response I will be highly appreciate💪💪💪
@md.mehedihasan8324
@md.mehedihasan8324 5 лет назад
Sir , Excellent Lecture..
@rahulsmarty1648
@rahulsmarty1648 5 лет назад
U r great sir....tnq u for helping me in examination by these Vedio...tnq u soo much sir.
@ananyasahoo671
@ananyasahoo671 5 лет назад
Thank you sir...ur videos were of great use ...
@HK-sw3vi
@HK-sw3vi 2 года назад
Thanks a bunch, this made things clear
@amreshpathak6508
@amreshpathak6508 5 лет назад
Great explanation sir I appreciate it
@pranavitykyala7887
@pranavitykyala7887 4 года назад
neat and crystal clear explanation...
@DuuAlan
@DuuAlan 6 лет назад
Mate, you are awesome
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi alan thanks for your interest and support towards our channel.
@The123bunjy
@The123bunjy 5 лет назад
Sir, your teaching is really very good, understandable. Please sir also make a separate video for has function, universal hashing and also perfect hashing also.
@hectoralfonso5168
@hectoralfonso5168 3 года назад
Easy way to understand, thanks teacher
@snigdhashingade6097
@snigdhashingade6097 4 года назад
thank you, sir ......... great video!!
@a.yashwanth
@a.yashwanth 3 года назад
36:00 there is no need to encrypt hash code separately as the entire plain text and hash are encrypted using the key only known to those 2 people. You encrypt the hash code only when the message is sent in plain text format because anyone can modify the PT and recompute the hash code and the receiver doesn't know if the hash is not encrypted.
@karnansooriyakumar8002
@karnansooriyakumar8002 4 года назад
Thank you so much sir i got clear idea about types of authentication
@utsavseth7116
@utsavseth7116 Год назад
Beautifully explained
@rajmangukiya114
@rajmangukiya114 5 лет назад
fab video sir thanku
@munagaladivya236
@munagaladivya236 6 лет назад
Nice vedio I understud every thing WT u r explained
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi divya thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
@vineetkumar03
@vineetkumar03 5 лет назад
Great Sir Please share the SHA 3 Algo As soon as possible.
@mehranehk8784
@mehranehk8784 3 года назад
Great explanation thanks
@abubakursait4193
@abubakursait4193 4 года назад
Your videos are the only sources I depend on. Thanks a lot🌹
@sinekas790
@sinekas790 9 месяцев назад
Thank you sir your teaching is very well
@deepar3850
@deepar3850 2 года назад
Thank you so much sir😊😊very much useful🙂
@dr.shemalatha7636
@dr.shemalatha7636 5 лет назад
excellent explanation sir.
@BugsBunny071
@BugsBunny071 5 лет назад
i rarely comment on tutorials but this one was really really good.
@ManeshThankappan
@ManeshThankappan 5 лет назад
Sir. Your classes are excellent. Good to polish fundamentals. Could u give me examples (names) of some algorithm for 2nd and 3rd methods( for Message Authentication Codes and Hash Codes).
@gopinathpanda5889
@gopinathpanda5889 5 лет назад
sir I have a doubt in hash code. in case-2 of hash code the hash code was decrypted by public key of A.Which is available for all users and anyone can decrypt it.there is no use of private key.How this can be achieved.
@lordalbusseveruspotter914
@lordalbusseveruspotter914 5 лет назад
GREAT EXPLANATION
@tejasreechintada8324
@tejasreechintada8324 3 года назад
Thankyou for your explanation sir 😅
@paritagojariya5300
@paritagojariya5300 5 лет назад
Great Video..!
@anmaraljanabi7137
@anmaraljanabi7137 4 года назад
Many thanks for sharing :)
@essarshed5197
@essarshed5197 4 года назад
thank you sir great session
@rajujoseph2948
@rajujoseph2948 4 года назад
EXCELLENT VIDEO
@sagnikchakraborty165
@sagnikchakraborty165 6 лет назад
sir in case of hash function can't we encrypt the hash code using secret key i mean symetric key cryptography technique?
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi chakraborty of course you can encrypt the hash code with secret key and the same should reflected on receivers side.
@venkireddy64
@venkireddy64 3 года назад
When r u planning to add other videos in this series sir You are doing awesome job
@SachinKumar-kd2fr
@SachinKumar-kd2fr 6 лет назад
Nicely explained Sir
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi sachin thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@sriharshagade111
@sriharshagade111 5 лет назад
please complete the playlist. It will be very helpful
@musabello2315
@musabello2315 11 месяцев назад
❤ god bless you more
@divyahoney4687
@divyahoney4687 6 лет назад
Good explanation sir tq soooo much
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi divya thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@amar.mishraamar.mishra9536
@amar.mishraamar.mishra9536 6 лет назад
Great Sir.
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi amar thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@everythinguneed__1721
@everythinguneed__1721 4 года назад
thank you sir you are the best
@a.yashwanth
@a.yashwanth 3 года назад
26:00 if we want only authentication, then what's the point of encrypting the plain text. Only encrypting the MAC is enough. If someone wants to change the PT then he cannot recalculate the MAC and modify it as he won't have the key to encrypt it. edit: oh, that's what hash functions do.
@mrsrujana6079
@mrsrujana6079 5 лет назад
Sir please explain s/mime and pgp format. Tomorrow is my exam. I am hoping that u will upload it soon .Thank you :)
@shashankgarg4997
@shashankgarg4997 5 лет назад
How does the receiver get to know the MAC code that was applied so that it can it can be compared with the senders MAC?
@saldi3543
@saldi3543 5 лет назад
Big Big Like Thank you
@prajjwaltiwari2564
@prajjwaltiwari2564 4 года назад
Great video sir... Sir could u pls explain DES n AES with an example Or its implementation...
@ashidevkc9003
@ashidevkc9003 5 лет назад
great one
@isha_ch23
@isha_ch23 Год назад
Thank you
@PreetiSingh-ko7dm
@PreetiSingh-ko7dm 5 лет назад
can u plz..tell me real workd example...... email id can be an example of second case in messsage encryption?
@dikshu_jhansi
@dikshu_jhansi 6 лет назад
Super ga cheptunaru sir
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi jhansi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@rohitsain13
@rohitsain13 6 лет назад
nice work ..
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi Rohit thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@sudhanshujha5408
@sudhanshujha5408 4 года назад
Sir can you please tell how come the authentication is achieved in 3rd case of message encryption because there reciever is not recognised by the sender and as you say for authentication both should recognise each other so it fails as per that concept🙄
@rohithmallampalli5930
@rohithmallampalli5930 5 лет назад
nice explanation sir
@vishavgupta3717
@vishavgupta3717 5 лет назад
Excellent Sir
@scatteringparameters.4167
@scatteringparameters.4167 3 года назад
Genius ⚡⚡⚡
@madhusudhana262
@madhusudhana262 5 лет назад
can you make a video on lamport authentication scheme?
@arian7472
@arian7472 5 лет назад
just can you correct me if iam worng hash function is md5 , sha , hmac the first one without shared secret key is md5 or sha the second one with using shared key is hmac
@Michelle-rb6nl
@Michelle-rb6nl Год назад
thank you!🤯
@prakashghimire8996
@prakashghimire8996 5 лет назад
Sir What are the types of authentication services and techniques of authentication?
@NareshKumar-bl3sy
@NareshKumar-bl3sy 6 лет назад
Very Nice Lecture Sirji !! Grand Salute!!!
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi naresh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@anaganisaiteja9061
@anaganisaiteja9061 5 лет назад
GURUJI U RRRRRRRRR GREATTTTTTTT
@dhananjaychobhe1844
@dhananjaychobhe1844 5 лет назад
18:11 MAC
@meet.patel18
@meet.patel18 4 года назад
30:00 hash function
@mubashareenahmad2404
@mubashareenahmad2404 4 года назад
What are the authentication functions (c) and hash functions (h) we are applying for the plaintext ?
@sundeepsaradhi
@sundeepsaradhi 4 года назад
hi here the Receiver should know whether the received message is sent from valid and authorized user and this process is called authentication and also the message should not be altered during the transmission and this process is called Integrity. In order to achieve authentication and integrity we will use authentication and hash functions. Hope your doubt has been clarified.
@maheshreddyalumuru9973
@maheshreddyalumuru9973 5 лет назад
Sir, I need video on data integrity
@shashikantupadhyay4818
@shashikantupadhyay4818 5 лет назад
God bless you
@indi4889
@indi4889 2 года назад
Thank you sir
@kamalajashet5611
@kamalajashet5611 6 лет назад
sir will you please explain RC6 and Cast 128 algorithms.. ?
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi kamalaja definitely i will try to upload them soon.
@zohebhasan2940
@zohebhasan2940 6 лет назад
Thanks
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi hasan thanks for watching my sessions and interest towards our channel.
@Sourav9835
@Sourav9835 4 года назад
How the secret key will be generated and shared between sender and receiver
@user-ic3fh6ru3g
@user-ic3fh6ru3g 4 года назад
superb
@sadaffatima2076
@sadaffatima2076 5 лет назад
Very nice
@kotiprasad5522
@kotiprasad5522 6 лет назад
As the public key for all the users will be same for a particular message, then what is meant by encrypting with userA private key and decrypting with userB public key. i mean any user can decrypt with public key of that particular message right.
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi prasad in two ways we can perform this encryption and decryption 1. encrypting with userA private key and decrypting with userB public key. (here there is no confidentiality as any one can decrypt the message because of using public key which will be available with all users) 2. encrypting with userB public key and decrypting with userB private key. (here there is no authentication as any one can send the message because of using public key for encryption) so in order to achieve both we need to apply the dual encryption and dual decryption by combining these two methods one after another. so that we can achieve both confidentiality and authentication. encrypting with userA private key and then again encrypting using UserB public Key decrypting with userB private key and then again decryption using UserA public key.
@kaushikdutta9325
@kaushikdutta9325 5 лет назад
No every user will have unique set of public private keys
@BrijeshYadav-vl7bj
@BrijeshYadav-vl7bj 6 лет назад
Nice lecture Sundeep.
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi Brijesh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@ramaraog4630
@ramaraog4630 6 лет назад
Good sir kindly reveal another topics of network security like rc4,linear crypt analysis and different crypt analysis ,blow fish, except alog
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi rama rao thanks for your interest towards my sessions and soon i will upload them.
@sharonrosy9519
@sharonrosy9519 5 лет назад
Tq sir
@web-university
@web-university 6 лет назад
very nice
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi harsha thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@kripasindhu1968
@kripasindhu1968 6 лет назад
Hi Sundeep, I have a doubt in MAC concept.. Here you are using key to generate MAC, so the key is a Public key or Private key. How does key exchange happen if same key used to encrypt and decrypt
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi sindhu in MAC the key is secret key ( not public or private ) and the same key should be used at receiver side.The key may be exchanged using Diffie Hellman key exchange or other exchange algorithms. Hope your doubt has been clarified.
@kripasindhu1968
@kripasindhu1968 6 лет назад
Thanks a lot. I got it.
@priyankamannava4639
@priyankamannava4639 5 лет назад
Please explain discrete logorithms
@syedrashidalishah4646
@syedrashidalishah4646 6 лет назад
keep it up
@sundeepsaradhi
@sundeepsaradhi 6 лет назад
hi syed thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@ashwinir5110
@ashwinir5110 3 года назад
In MAC method, how k1,k2 are exchanged
@thedifferent7562
@thedifferent7562 4 года назад
I'm confused...you said no key for hash but in the last type of hash function you have used key for both the hash code and the message... please explain :/
@sundeepsaradhi
@sundeepsaradhi 4 года назад
Hi In order to generate hash code we need not use of key on plain text but for acheiving the confidentiality we will encrypt the plain text along with hash code. Hope your doubt has been clarified.
@gandesirisrikanth9001
@gandesirisrikanth9001 Год назад
Hello sir please post the types of firewalls video
Далее
NETWORK SECURITY - SHA 512 (AUTHENTICATION ALGORITHM)
42:16
Yeni Özbək Mahnisi Yoxsa Vefali Reqsi? 😍
00:36
Просмотров 2,5 млн
100❤️
00:19
Просмотров 2,4 млн
NETWORK SECURITY - HMAC ALGORITHM
20:58
Просмотров 146 тыс.
Multiple Encryption and Triple DES
20:54
Просмотров 34 тыс.
Yeni Özbək Mahnisi Yoxsa Vefali Reqsi? 😍
00:36
Просмотров 2,5 млн