[CompNetSec] - 13 - Cryptographic Hash Functions
* Intro (time: 0:00) * Hash Functions (time: 1:06, slide(s): 3-6) * Message Authentication Code (MAC) (time: 1:11, slide(s): 7) * Digital Signatures (time: 1...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
* Intro (time: 0:00)
* Hash Functions (time: 1:06, slide(s): 3-6)
* Message Authentication Code (MAC) (time: 1:11, slide(s): 7)
* Digital Signatures (time: 12:50, slide(s): 8-9)
* Other Applications (time: 15:34, slide(s): 10)
* Two Simple Hash Functions (time: 19:35, slide(s): 11)
* Requirements and Security (time: 22:24, slide(s): 13-14)
- Preimage (time: 22:43, slide(s): 13)
- Collision (time: 25:01, slide(s): 13)
* Relationship among Hash Function Properties (time: 29:04, slide(s): 15-16)
* Brute-Force Attacks (time: 32:55, slide(s): 17)
* Crypatanlysis (time: 34:01, slide(s): 17)
* Collision Resistant Attacks (time: 34:20, slide(s): 18-19)
* General Structure of Secure Hash Code (time: 41:28, slide(s): 20)
* Hash Functions Based on Cipher Block Chaining (time: 42:51, slide(s): 21)
* Secure Hash Algorithm (SHA) (time: 45:01, slide(s): 31-30)
* First Collision for Full SHA-1 (time: 57:11)
* Summary (time: 59:09, slide(s): 31)
ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous!
--Computer and Network Security
Video Information
Views
7.3K
Total views since publication
Duration
01:00:43
Video length
Published
Dec 17, 2020
Release date
Quality
hd
Video definition