Applied Cryptography: 3. Hash functions and HMAC
Lecture 3: Cryptographic hash function and its properties, brute-force attack and security level, security of server-side password hashing, commitment scheme...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
Lecture 3: Cryptographic hash function and its properties, brute-force attack and security level, security of server-side password hashing, commitment scheme, hash-based PRNG, hash chain, hash tree (Merkle tree), Hash-based Message Authentication Code (HMAC)
00:00 Introduction
00:12 Hash function
03:09 Cryptographic hash function
07:02 Security Level
11:08 Cryptographic hash functions
14:56 Data identification and integrity verification
19:29 Server-side password storage
30:57 Commitment scheme
36:13 Coin flipping over phone
38:20 Hash-based PRNG
41:05 Hash chain
44:06 Hash tree (Merkle tree)
47:01 HMAC: Hash-based Message Authentication Code
50:49 Questions
50:56 Task: HMAC
52:19 DigestInfo
53:18 Task: HMAC
55:06 Task: Test cases
56:01 pyasn1 library for decoding DER
University of Tartu, MTAT.07.017 Applied Cryptography, Spring 2024
Instructor: Arnis Parsovs
View the complete course: https://courses.cs.ut.ee/2024/appcrypto/spring
Video Information
Views
635
Total views since publication
Likes
10
User likes and reactions
Duration
57:46
Video length
Published
May 22, 2024
Release date
Quality
hd
Video definition