[CompNetSec] - 13 - Cryptographic Hash Functions

* Intro (time: 0:00) * Hash Functions (time: 1:06, slide(s): 3-6) * Message Authentication Code (MAC) (time: 1:11, slide(s): 7) * Digital Signatures (time: 1...

Hicham Elmongui•7.3K views•01:00:43

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

* Intro (time: 0:00) * Hash Functions (time: 1:06, slide(s): 3-6) * Message Authentication Code (MAC) (time: 1:11, slide(s): 7) * Digital Signatures (time: 12:50, slide(s): 8-9) * Other Applications (time: 15:34, slide(s): 10) * Two Simple Hash Functions (time: 19:35, slide(s): 11) * Requirements and Security (time: 22:24, slide(s): 13-14) - Preimage (time: 22:43, slide(s): 13) - Collision (time: 25:01, slide(s): 13) * Relationship among Hash Function Properties (time: 29:04, slide(s): 15-16) * Brute-Force Attacks (time: 32:55, slide(s): 17) * Crypatanlysis (time: 34:01, slide(s): 17) * Collision Resistant Attacks (time: 34:20, slide(s): 18-19) * General Structure of Secure Hash Code (time: 41:28, slide(s): 20) * Hash Functions Based on Cipher Block Chaining (time: 42:51, slide(s): 21) * Secure Hash Algorithm (SHA) (time: 45:01, slide(s): 31-30) * First Collision for Full SHA-1 (time: 57:11) * Summary (time: 59:09, slide(s): 31) ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous! --Computer and Network Security

Video Information

Views
7.3K

Total views since publication

Duration
01:00:43

Video length

Published
Dec 17, 2020

Release date

Quality
hd

Video definition