Master Cryptographic Hash Functions & Their Role in Security π
Learn the fundamentals of cryptographic hash functions, Message Authentication Codes (MAC), and digital signatures to strengthen your cybersecurity knowledge. Perfect for beginners and professionals alike!

Hicham Elmongui
7.3K views β’ Dec 17, 2020

About this video
* Intro (time: 0:00)
* Hash Functions (time: 1:06, slide(s): 3-6)
* Message Authentication Code (MAC) (time: 1:11, slide(s): 7)
* Digital Signatures (time: 12:50, slide(s): 8-9)
* Other Applications (time: 15:34, slide(s): 10)
* Two Simple Hash Functions (time: 19:35, slide(s): 11)
* Requirements and Security (time: 22:24, slide(s): 13-14)
- Preimage (time: 22:43, slide(s): 13)
- Collision (time: 25:01, slide(s): 13)
* Relationship among Hash Function Properties (time: 29:04, slide(s): 15-16)
* Brute-Force Attacks (time: 32:55, slide(s): 17)
* Crypatanlysis (time: 34:01, slide(s): 17)
* Collision Resistant Attacks (time: 34:20, slide(s): 18-19)
* General Structure of Secure Hash Code (time: 41:28, slide(s): 20)
* Hash Functions Based on Cipher Block Chaining (time: 42:51, slide(s): 21)
* Secure Hash Algorithm (SHA) (time: 45:01, slide(s): 31-30)
* First Collision for Full SHA-1 (time: 57:11)
* Summary (time: 59:09, slide(s): 31)
ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous!
--Computer and Network Security
* Hash Functions (time: 1:06, slide(s): 3-6)
* Message Authentication Code (MAC) (time: 1:11, slide(s): 7)
* Digital Signatures (time: 12:50, slide(s): 8-9)
* Other Applications (time: 15:34, slide(s): 10)
* Two Simple Hash Functions (time: 19:35, slide(s): 11)
* Requirements and Security (time: 22:24, slide(s): 13-14)
- Preimage (time: 22:43, slide(s): 13)
- Collision (time: 25:01, slide(s): 13)
* Relationship among Hash Function Properties (time: 29:04, slide(s): 15-16)
* Brute-Force Attacks (time: 32:55, slide(s): 17)
* Crypatanlysis (time: 34:01, slide(s): 17)
* Collision Resistant Attacks (time: 34:20, slide(s): 18-19)
* General Structure of Secure Hash Code (time: 41:28, slide(s): 20)
* Hash Functions Based on Cipher Block Chaining (time: 42:51, slide(s): 21)
* Secure Hash Algorithm (SHA) (time: 45:01, slide(s): 31-30)
* First Collision for Full SHA-1 (time: 57:11)
* Summary (time: 59:09, slide(s): 31)
ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous!
--Computer and Network Security
Video Information
Views
7.3K
Duration
01:00:43
Published
Dec 17, 2020
User Reviews
3.8
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now