Understanding Message Authentication Codes in Data Security

In Week 5 of Information Security, this video covers the impacts of ciphertext modification, explores the adaptive chosen ciphertext attack game (CCA2), discusses block cipher padding, and delves into public key cryptography.

Aleksander Essex21.0K views21:56

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in South Korea under the topic 'cybersecurity news today'.

About this video

Information Security - Week 5 In this video: Effects of ciphertext modification, the adaptive chosen ciphertext attack game (CCA2), block cipher padding, PKCS #7, padding oracle attacks, message authentication codes (MACs), hash based message authentication codes (HMAC), MAC configurations, encrypt-then-mac, mac-then-encrypt, authenticated encryption, AES-GCM Undergraduate course on networking security and cryptography taught by Aleksander Essex, Ph.D., P.Eng., Associate professor of Software Engineering, Associate Chair (Graduate), Department of Electrical and Computer Engineering, Western University, Canada Website: https://essex.cc Twitter: https://twitter.com/aleksessex Course topics include: Confidentiality, authenticity, integrity, ciphers, plaintext, ciphertext, encryption, decryption, keys, key generation function, uniform random, semantic security, bits of security, brute force, Kerckhoff's principle, semantic security, ciphertext indistinguishability, IND-CPA, INC-CCA, block ciphers, message padding, PKCS 7, modes of operation, initialization vector, pseudo-random permutation, counter mode, cipher block chaining, electronic codebook mode, counter mode, CBC, ECB, CTR, Advanced Encryption Standard, AES, hash functions, random oracles, pre-image resistance, collision resistance, SHA-1, SHA-256, SHA3, SHA-513, MD5, message authentication codes, MACs, Galois counter mode, GCM, AEC-GCM, public-key cryptography, Diffie-Hellman, public-key agreement, Elliptic curve Diffie-Hellman, DHE, ECDHE, digital signatures, ECDSA, RSA signatures, PKCS v1.5, digital certificates, X.509, public-key infrastructure, PKI, certificate pinning, certificate revocation, CRL, trust store, Transport Layer Security, TLS, TLS 1.2, TLS 1.3, HTTP over TLS, HTTPS Secure Shell, SSH, ciphersuite, client hello, server hello, VPNs, TOR, 802.11, wifi encryption, client authentication, passwords, password hashing, password lengths, single sign-on, federated identity ---- Music: Arp Bounce - Geographer Support by RFM - NCM: https://bit.ly/2xGHypM Slide template: Slidesgo including Flaticons with infographics & images by Freepik

Video Information

Views
21.0K

Total views since publication

Likes
450

User likes and reactions

Duration
21:56

Video length

Published
Oct 16, 2020

Release date

Quality
hd

Video definition