Free Short Course: Cryptography - Module 4 (without Q&A)
Understanding cyber security is becoming increasingly important in our ever changing, permanently connected, digital lives. Our digital footprint is ever gro...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
Understanding cyber security is becoming increasingly important in our ever changing, permanently connected, digital lives. Our digital footprint is ever growing and the requirement to keep our digital identities safe and secure is becoming increasingly important as our reliance on online technologies grows.
Sign up here: https://itmasters.edu.au/short-courses/cryptography/
Welcome 0:00
Outline 3:32
Hash Functions 4:20
Hash Function; h=H(M) 10:58
Hash Attacks 13:32
Message Authentication Code (MAC) 19:04
Digital Signature 22:40
Other uses of Hash Functions 24:50
Security requirements of a hash function 29:00
Functional hash function resistance properties 33:44
Attacks on Hash Functions 34:50
General Structure of a Secure Hash Code 38:20
Cipher Block Chaining 39:30
Q&A Break 42:57
Secure Hash Algorithm (SHA) 45:54
Comparison of SHA Parameters 48:27
SHA-3 49:57
Sponge Construction 53:48
Sponmge Function Input & Output 56:50
SHA-3 Parameters 58:51
Great Reference 1:02:18
Learning Tasks & Exam 1:06:26
WXYZ Questions 1:09:45
Video Information
Views
668
Total views since publication
Likes
11
User likes and reactions
Duration
01:18:23
Video length
Published
Oct 13, 2021
Release date
Quality
hd
Video definition
Captions
Available
Subtitles enabled
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.