NETWORK SECURITY - TYPES OF AUTHENTICATION (Message Encryption, MAC, Hash Functions)

Sdílet
Vložit
  • čas přidán 31. 01. 2018
  • Three types of Authentications
    1. Message Encryption
    2. Message Authentication Code
    3. Hash Functions.

Komentáře • 164

  • @redmuffler3186
    @redmuffler3186 Před 4 lety +56

    I had so many "Oooohhhh!!" moments during this. Thank you so much!

  • @jirilzala7573
    @jirilzala7573 Před 5 lety +17

    Thank you so much sir. I was trying to understand this for last 3-4 hours but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.

  • @gowthamiirao9010
    @gowthamiirao9010 Před 5 lety +5

    well explained sir. I was confused with MAC and HASH and now its clear. thank you very much.

  • @webnetweaverwebnetweaver9185

    Very concise explanation. This is the best general explanation of application security methods I've seen. Many thanks to you for this!

  • @kashmirinsights6597
    @kashmirinsights6597 Před 6 lety +38

    Great Video ...First Time In my 4 Years I have Commented Any Tutorial ...Your A Gem

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety +1

      hi
      Thanks for your interest towards our channel and your support towards our channel.

  • @iEntertainmentFunShorts
    @iEntertainmentFunShorts Před 5 lety +2

    Waw awwsome...sir if you guys coming after reading books either kurose and ross or fourozen this is best lecture you found go for it with 1.25× speed.Tq sir

  • @sTadelaSanthoshi
    @sTadelaSanthoshi Před rokem

    Thank you so much sir. I was very fear about this topic but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us..............
    I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.

  • @279aishwaryavallala7
    @279aishwaryavallala7 Před 5 lety

    superb teaching sir am following your lecturs for network security the explaination is very simple and easy to understand simply superb........Thank you very much sir

  • @sagarsoni1033
    @sagarsoni1033 Před 5 lety +1

    you are gem... I love your teaching style

  • @crazyanonymous8393
    @crazyanonymous8393 Před 5 lety +1

    Superb teaching iever seen thisi type of techning..

  • @mayankbhagat4154
    @mayankbhagat4154 Před 5 lety +4

    Sir your lectures were really very helpful. You are an outstanding teacher. I would like to suggest that after explaining each of the authentication methods or cipher algorithms you should have explained their advantages and disadvantages. That would have given us more insight. Thanks

  • @maheshb3756
    @maheshb3756 Před 3 lety

    Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.

  • @Jatangi_Raju
    @Jatangi_Raju Před 2 lety

    i am cleared all my subjects by watching your videos.......its a small word but, thank you so much sir.😊😊😊😊

  • @garima3331
    @garima3331 Před 5 lety

    Great teacher sir!.. thank you so much... very nice explanation

  • @attitudeboy2840
    @attitudeboy2840 Před rokem

    Thank you for your valuable information ✨✨..
    This video.. your video.. ofter 5 years also still... Giving.. Knowledge.. for US...
    Thank you...❤

  • @pnkjthapliyal
    @pnkjthapliyal Před 5 lety

    simply great .thanks for the lecture.

  • @zeynepgul551
    @zeynepgul551 Před 3 lety

    Great video, sir. Thank you so much!

  • @rahulsmarty1648
    @rahulsmarty1648 Před 5 lety

    U r great sir....tnq u for helping me in examination by these Vedio...tnq u soo much sir.

  • @sripadkulkarni
    @sripadkulkarni Před 6 lety +7

    Wow you are a gem... need more people like u in the teaching field who have passion to educate people...I have decided to watch every lecture of yours irrespective of being relevant to my domain of work, I feel I can learn a lot of new things from you... lots of respects and love... thank you!!

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi kulkarni
      thank you very much.
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

    • @kalubaeliza4147
      @kalubaeliza4147 Před rokem

      @@sundeepsaradhi thank you sir, well explained kindly sir am requesting a tutorial about Pluggable Authentication Modules (PAM) your positive response I will be highly appreciate💪💪💪

  • @raghavagarwal6734
    @raghavagarwal6734 Před 5 lety

    Well done! U have explained well!

  • @someone1ben
    @someone1ben Před 5 lety +1

    First Indian Video I never skipped.

    • @sundeepsaradhi
      @sundeepsaradhi  Před 5 lety

      Hi
      Very nice to see your comment and thanks for your support towards our channel.

  • @md.mehedihasan8324
    @md.mehedihasan8324 Před 5 lety +1

    Sir , Excellent Lecture..

  • @pranavitykyala7887
    @pranavitykyala7887 Před 4 lety

    neat and crystal clear explanation...

  • @DuuAlan
    @DuuAlan Před 6 lety +3

    Mate, you are awesome

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi alan
      thanks for your interest and support towards our channel.

  • @amreshpathak6508
    @amreshpathak6508 Před 5 lety

    Great explanation sir I appreciate it

  • @Optimistic_aspirant
    @Optimistic_aspirant Před 5 lety

    Thank you sir...ur videos were of great use ...

  • @The123bunjy
    @The123bunjy Před 5 lety

    Sir, your teaching is really very good, understandable. Please sir also make a separate video for has function, universal hashing and also perfect hashing also.

  • @snigdhashingade6097
    @snigdhashingade6097 Před 5 lety

    thank you, sir ......... great video!!

  • @HK-sw3vi
    @HK-sw3vi Před 2 lety +1

    Thanks a bunch, this made things clear

  • @utsavseth7116
    @utsavseth7116 Před rokem

    Beautifully explained

  • @munagaladivya236
    @munagaladivya236 Před 6 lety +1

    Nice vedio I understud every thing WT u r explained

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi divya
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.

  • @paritagojariya5300
    @paritagojariya5300 Před 5 lety

    Great Video..!

  • @mehranehk8784
    @mehranehk8784 Před 3 lety

    Great explanation thanks

  • @rajmangukiya114
    @rajmangukiya114 Před 5 lety +1

    fab video sir thanku

  • @hectoralfonso5168
    @hectoralfonso5168 Před 3 lety

    Easy way to understand, thanks teacher

  • @gopinathpanda5889
    @gopinathpanda5889 Před 5 lety +2

    sir I have a doubt in hash code.
    in case-2 of hash code the hash code was decrypted by public key of A.Which is available for all users and anyone can decrypt it.there is no use of private key.How this can be achieved.

  • @a.yashwanth
    @a.yashwanth Před 3 lety +3

    36:00 there is no need to encrypt hash code separately as the entire plain text and hash are encrypted using the key only known to those 2 people.
    You encrypt the hash code only when the message is sent in plain text format because anyone can modify the PT and recompute the hash code and the receiver doesn't know if the hash is not encrypted.

  • @karnansooriyakumar8002

    Thank you so much sir
    i got clear idea about types of authentication

  • @dr.shemalatha7636
    @dr.shemalatha7636 Před 5 lety

    excellent explanation sir.

  • @rajujoseph2948
    @rajujoseph2948 Před 5 lety

    EXCELLENT VIDEO

  • @ManeshThankappan
    @ManeshThankappan Před 5 lety

    Sir. Your classes are excellent. Good to polish fundamentals. Could u give me examples (names) of some algorithm for 2nd and 3rd methods( for Message Authentication Codes and Hash Codes).

  • @anmaraljanabi7137
    @anmaraljanabi7137 Před 4 lety

    Many thanks for sharing :)

  • @lordalbusseveruspotter914

    GREAT EXPLANATION

  • @deepar3850
    @deepar3850 Před 2 lety

    Thank you so much sir😊😊very much useful🙂

  • @scatteringparameters.4167

    Genius ⚡⚡⚡

  • @sinekas790
    @sinekas790 Před 10 měsíci

    Thank you sir your teaching is very well

  • @musabello2315
    @musabello2315 Před rokem

    ❤ god bless you more

  • @amar.mishraamar.mishra9536

    Great Sir.

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi amar
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @essarshed5197
    @essarshed5197 Před 4 lety

    thank you sir great session

  • @vineetkumar03
    @vineetkumar03 Před 5 lety +1

    Great Sir
    Please share the SHA 3 Algo
    As soon as possible.

  • @SachinKumar-kd2fr
    @SachinKumar-kd2fr Před 6 lety +2

    Nicely explained Sir

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi sachin
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @tejasreechintada8324
    @tejasreechintada8324 Před 3 lety

    Thankyou for your explanation sir 😅

  • @Michelle-rb6nl
    @Michelle-rb6nl Před 2 lety

    thank you!🤯

  • @sagnikchakraborty165
    @sagnikchakraborty165 Před 6 lety +4

    sir in case of hash function can't we encrypt the hash code using secret key i mean symetric key cryptography technique?

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety +1

      hi chakraborty
      of course you can encrypt the hash code with secret key and the same should reflected on receivers side.

  • @saldi3543
    @saldi3543 Před 5 lety

    Big Big Like Thank you

  • @abubakursait4193
    @abubakursait4193 Před 4 lety

    Your videos are the only sources I depend on.
    Thanks a lot🌹

  • @venkireddy64
    @venkireddy64 Před 3 lety

    When r u planning to add other videos in this series sir
    You are doing awesome job

  • @vishavgupta3717
    @vishavgupta3717 Před 5 lety

    Excellent Sir

  • @rohitsain13
    @rohitsain13 Před 6 lety +1

    nice work ..

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi Rohit
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @ashidevkc9003
    @ashidevkc9003 Před 5 lety

    great one

  • @shashankgarg4997
    @shashankgarg4997 Před 6 lety

    How does the receiver get to know the MAC code that was applied so that it can it can be compared with the senders MAC?

  • @divyahoney4687
    @divyahoney4687 Před 6 lety +1

    Good explanation sir tq soooo much

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi divya
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @everythinguneed__1721
    @everythinguneed__1721 Před 4 lety

    thank you sir you are the best

  • @sadaffatima2076
    @sadaffatima2076 Před 5 lety

    Very nice

  • @rohithmallampalli5930
    @rohithmallampalli5930 Před 5 lety

    nice explanation sir

  • @prajjwaltiwari2564
    @prajjwaltiwari2564 Před 4 lety

    Great video sir... Sir could u pls explain DES n AES with an example Or its implementation...

  • @user-ic3fh6ru3g
    @user-ic3fh6ru3g Před 4 lety

    superb

  • @mrsrujana6079
    @mrsrujana6079 Před 5 lety +1

    Sir please explain s/mime and pgp format. Tomorrow is my exam. I am hoping that u will upload it soon .Thank you :)

  • @a.yashwanth
    @a.yashwanth Před 3 lety +1

    26:00 if we want only authentication, then what's the point of encrypting the plain text. Only encrypting the MAC is enough. If someone wants to change the PT then he cannot recalculate the MAC and modify it as he won't have the key to encrypt it.
    edit: oh, that's what hash functions do.

  • @BugsBunny071
    @BugsBunny071 Před 5 lety

    i rarely comment on tutorials but this one was really really good.

  • @sudhanshujha5408
    @sudhanshujha5408 Před 4 lety

    Sir can you please tell how come the authentication is achieved in 3rd case of message encryption because there reciever is not recognised by the sender and as you say for authentication both should recognise each other so it fails as per that concept🙄

  • @Ok_dikshu
    @Ok_dikshu Před 6 lety +1

    Super ga cheptunaru sir

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi jhansi
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @muhammadrehanahmed3611

    👍

  • @isha_ch23
    @isha_ch23 Před rokem

    Thank you

  • @anaganisaiteja9061
    @anaganisaiteja9061 Před 5 lety

    GURUJI U RRRRRRRRR GREATTTTTTTT

  • @arian7472
    @arian7472 Před 5 lety

    just can you correct me if iam worng
    hash function is md5 , sha , hmac
    the first one without shared secret key is md5 or sha
    the second one with using shared key is hmac

  • @PreetiSingh-ko7dm
    @PreetiSingh-ko7dm Před 5 lety +1

    can u plz..tell me real workd example......
    email id can be an example of second case in messsage encryption?

  • @kamathprajna
    @kamathprajna Před 2 lety

    Thank you sir

  • @ruthvikrajam.v4303
    @ruthvikrajam.v4303 Před 5 lety

    super

  • @shashikantupadhyay4818

    God bless you

  • @sriharshagade111
    @sriharshagade111 Před 5 lety

    please complete the playlist. It will be very helpful

  • @syedrashidalishah4646
    @syedrashidalishah4646 Před 6 lety +1

    keep it up

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi syed
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @NareshKumar-bl3sy
    @NareshKumar-bl3sy Před 6 lety +1

    Very Nice Lecture Sirji !! Grand Salute!!!

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi naresh
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @zohebhasan2940
    @zohebhasan2940 Před 6 lety +2

    Thanks

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi hasan
      thanks for watching my sessions and interest towards our channel.

  • @web-university
    @web-university Před 6 lety +1

    very nice

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi harsha
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @mubashareenahmad2404
    @mubashareenahmad2404 Před 4 lety +1

    What are the authentication functions (c) and hash functions (h) we are applying for the plaintext ?

    • @sundeepsaradhi
      @sundeepsaradhi  Před 4 lety +2

      hi
      here the Receiver should know whether the received message is sent from valid and authorized user and this process is called authentication and also the message should not be altered during the transmission and this process is called Integrity.
      In order to achieve authentication and integrity we will use authentication and hash functions.
      Hope your doubt has been clarified.

  • @prakashghimire8996
    @prakashghimire8996 Před 6 lety

    Sir What are the types of authentication services and techniques of authentication?

  • @ashwinir5110
    @ashwinir5110 Před 3 lety

    In MAC method, how k1,k2 are exchanged

  • @sharonrosy9519
    @sharonrosy9519 Před 5 lety +1

    Tq sir

  • @chsaidattapavanbalaji7996

    Thankyou Sir

  • @narayananbhooma8566
    @narayananbhooma8566 Před 4 lety

    hello sir,you are saying that hash is independent of key,but in second case your are using secret key for the encryption of the whole message,why?

  • @madhusudhana262
    @madhusudhana262 Před 5 lety

    can you make a video on lamport authentication scheme?

  • @Sourav9835
    @Sourav9835 Před 5 lety

    How the secret key will be generated and shared between sender and receiver

  • @vikings_kingdom763
    @vikings_kingdom763 Před 5 lety

    thanku sir

  • @meet.patel18
    @meet.patel18 Před 4 lety +2

    30:00 hash function

  • @thedifferent7562
    @thedifferent7562 Před 4 lety +1

    I'm confused...you said no key for hash but in the last type of hash function you have used key for both the hash code and the message... please explain :/

    • @sundeepsaradhi
      @sundeepsaradhi  Před 4 lety +1

      Hi
      In order to generate hash code we need not use of key on plain text but for acheiving the confidentiality we will encrypt the plain text along with hash code.
      Hope your doubt has been clarified.

  • @dhananjaychobhe1844
    @dhananjaychobhe1844 Před 5 lety +9

    18:11 MAC

  • @devaaravind1604
    @devaaravind1604 Před 4 lety

    love you 3000 sir

  • @ramaraog4630
    @ramaraog4630 Před 6 lety +2

    Good sir kindly reveal another topics of network security like rc4,linear crypt analysis and different crypt analysis ,blow fish, except alog

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi rama rao
      thanks for your interest towards my sessions and soon i will upload them.

  • @BrijeshYadav-vl7bj
    @BrijeshYadav-vl7bj Před 6 lety +2

    Nice lecture Sundeep.

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi Brijesh
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.