Lecture 22: MAC (Message Authentication Codes) and HMAC by Christof Paar

Sdílet
Vložit
  • čas přidán 29. 01. 2014
  • For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com

Komentáře • 44

  • @hs3881
    @hs3881 Před 4 lety +21

    Great lecture, after a lot of searching this was finally the explanation I needed. The fact that professor had to beg the students for attention is so sad.

  • @TheDancingOwl
    @TheDancingOwl Před 6 lety +5

    At the beginning of the lecture, I had a doubt that this teacher could give me answers about my long-term questions about MAC (authentication and non-repudiation) and I must say that he gave me straight and simple anwers twenty minutes later: Thank you for this M Paar ! I enjoy the way you provide an example on the most important stuff.

  • @dpraajz
    @dpraajz Před 4 lety +9

    25:40

  • @anirudhreddybasani3555
    @anirudhreddybasani3555 Před 4 lety +9

    I love when he says "surprise surprise"..

  • @yomyomcam
    @yomyomcam Před 3 lety +2

    What a great lecture. I cannot help to be upset at the people chatting in the background. How come they do not realize how interesting, informative, and useful this is, explained so easily and straightforward. Thank you for posting your videos!

  • @FelipeMontealegreS

    This man is an Amerian hero

  • @user-um7tw6kx4r6
    @user-um7tw6kx4r6 Před rokem

    Finally a good explanation that uses real-world examples, thank you

  • @fararian
    @fararian Před 3 lety +1

    Great lecture. After watching several videos this finally made things clear. Thanks.

  • @MrKiBk
    @MrKiBk Před 6 lety

    Thank you very much for publishing all this material. It is incredibly helpful!

  • @RoDrop
    @RoDrop Před 8 lety +4

    Love your lectures/videos. Thanks for posting.

  • @hassuunna
    @hassuunna Před 4 lety +3

    in

  • @willliu1306
    @willliu1306 Před 6 lety

    Thanks for your great lecture, I have a question about MAC secret prefix MACs, if we have the message length information in the key K , would it still need to use HMAC for security concern ?

  • @MIKEISRAEL21
    @MIKEISRAEL21 Před 4 lety

    Great lecture!!!!!!!!!!!!!!!!

  • @HarishKumar-tl9hg
    @HarishKumar-tl9hg Před 8 lety +1

    thank you sooo much sir

  • @naveenpavithran5545
    @naveenpavithran5545 Před 9 lety +1

    Thankuu !!!!

  • @lynnelenatorbay1450
    @lynnelenatorbay1450 Před 3 lety

    Great class

  • @1UniverseGames
    @1UniverseGames Před 3 lety

    Any programming explanation of these lessons. Or any resources to learn programming for these lecture. Any helps

  • @HelloThere-xs8ss

    Where have you been this whole time!

  • @computerfis
    @computerfis Před 6 lety +2

    10.54 why do we transmit the clear text ( x ) over a public line?

  • @parthchholak6170
    @parthchholak6170 Před 4 lety +2

    I think I've come across a fallacy. When explaining 2.2 secret suffix MACs, professor Paar compares the brute force attack on key (128 bits) versus collision search (160 bits), he says the complexity should be 2^80 instead of 2^160 due to Birthday Paradox resulting 2^(n+1)/2 complexity. In the case of Birthday Paradox (Collision attack), we need Oscar to be able to freely choose X1 and X2 which is not the case here. Here, X1 is fixed and Oscar needs to find X2 that satisfies h(X2) = h(X1). In this case (2nd preimage attack), the complexity is computed as 2^n = 2^160. Is this correct or did I miss something?