Master Cryptographic Hash Functions & Their Role in Security πŸ”

Learn the fundamentals of cryptographic hash functions, Message Authentication Codes (MAC), and digital signatures to strengthen your cybersecurity knowledge. Perfect for beginners and professionals alike!

Master Cryptographic Hash Functions & Their Role in Security πŸ”
Hicham Elmongui
7.3K views β€’ Dec 17, 2020
Master Cryptographic Hash Functions & Their Role in Security πŸ”

About this video

* Intro (time: 0:00)
* Hash Functions (time: 1:06, slide(s): 3-6)
* Message Authentication Code (MAC) (time: 1:11, slide(s): 7)
* Digital Signatures (time: 12:50, slide(s): 8-9)
* Other Applications (time: 15:34, slide(s): 10)
* Two Simple Hash Functions (time: 19:35, slide(s): 11)
* Requirements and Security (time: 22:24, slide(s): 13-14)
- Preimage (time: 22:43, slide(s): 13)
- Collision (time: 25:01, slide(s): 13)
* Relationship among Hash Function Properties (time: 29:04, slide(s): 15-16)
* Brute-Force Attacks (time: 32:55, slide(s): 17)
* Crypatanlysis (time: 34:01, slide(s): 17)
* Collision Resistant Attacks (time: 34:20, slide(s): 18-19)
* General Structure of Secure Hash Code (time: 41:28, slide(s): 20)
* Hash Functions Based on Cipher Block Chaining (time: 42:51, slide(s): 21)
* Secure Hash Algorithm (SHA) (time: 45:01, slide(s): 31-30)
* First Collision for Full SHA-1 (time: 57:11)
* Summary (time: 59:09, slide(s): 31)

ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous!

--Computer and Network Security

Video Information

Views

7.3K

Duration

01:00:43

Published

Dec 17, 2020

User Reviews

3.8
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.