MAC in Cryptography || Message Authentication Code in Cryptography and network security
Vložit
- čas přidán 1. 12. 2019
- #MAC #messageAuthenticationCode #Cryptography #NetworkSecurity #security #AbhishekDit #InformationSecurity
Authentication functions :
• Authentication functio...
My 2nd CZcams channel (Cse Videos in English)
/ @educatorabhishek
MAC in Cryptography
what is Message authentication code
MAC in hindi
MAC in Network Security
what is MAC
what is Message authentication code in Cryptography and network security
best Cryptography playlist
best Cryptography Lectures
Cryprtography by ABHISHEK Sharma
Telegram channel :
t.me/abhisheksharmadit
Facebook page
/ abhishek_tutorials_inf...
Instagram : / abhishekdit
Twitter :
/ abhiaustin07
This is our Cryptography and network security Playlist.
In this video,i have explained MAC i.e. message authentication code.
If you're learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
There are lectures related to different subjects on this channel.Do check them out, guys.
Link is given below:
Placement videos:
• Interview process deta...
INFOSYS :
• INFOSYS
Amazon Interview questions
• Amazon Interview quest...
Linked List for Interviews :
• Linked List for interv...
Pointers in C :
• Pointers in C
Cryptography :
• Cryptography and netwo...
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
GATE QUESTIONS:
• GATE question solutions
.Net C# :
• .NET C#
Programming in C
• Programming in C
C PROGRAMS for beginners
• C programs for beginners
Java Tricky videos/programs for interviews :
• Java tricky programs/v...
File Handling in C :
• FILE Handling in C
C Programming tips and tricks:
• C tricky programs/videos
Abhishek VLOGS :
• #VLOG-1 Riding through...
Concerts :
• Khushboo Grewal concer...
Iss bande ne mera 6th sem ka cryptology course bacha liya bc. !! Shukriya bhai.. Much respect!!
Right yar 😊😊
mera kal h bhai dekhte hai 🥴🥴
I found your channel during my internal viva and today I'm having my external viva and I came directly to your channel playlist for my quick revision...great explanation 🌟
I love the way you teach...no need to learn from any notes..your one video is enough for understand everything
Thnk you so much,whole playlist was really helpful.really appreciating your videos👍
Thank you very much sir for the best concept, best explained. Love From Gujarat
❤🎉❤🎉thankyou
Keep the good work. Great explanation nd content. 😊
Thank you so much bro . It's very helpful for my exams.💖💖💖
very well explained ,thanks allot brother.....🙂
thanks a lot for these videos... your playist will help me nail my exam tomorrow..gbu
Surfing for this topic like a vagabond, and finally I found this video very useful. Thank you so much and God Bless you.
Thank You Sir!! for this explanation...
This makes it soo much easier to understand! Thank you so much for the explanation! ^_^
bc mujhe to kuch samajh he nhi aaya
this is some quality content! thankss
Excellent lecturers..
Good explanation !! Thank You !!!
The easiest explanation till time.
Thanks a TON Sir.
thank you it helped me through my college presentation..👍👍👍👍
osm bro.. thnq.. its very helpful
Easy explanation love it
Well explained....
very nicely explained really helpfull 👏👏👏
tqq it really amzing v gud explaination
Best. Thank you so much
Amazing ✨ thanks a lot.
bhaiya thank you so much!
Very great explanation.
THANK YOU soo much easier to understand
Awesome explanation bro.
Nice explanation
Thank u sir
In the receiver's end of the "authentication tied to cipher text part" ..the decryption will only be performed on the message part and not the MAC. although the arrow drawn is from the MAC but it will be from the "cipher text" .P.S: thanks for the great content.
Just wow
Awesome ❤️
Awalla
Nice explanation!
Thank sir 🙏
Thank you brother 😊
very well explained love from jaipur😍
Nice video
Nice explanation.
I was expecting to see implementation of MAC function, do you have another video or?
Thank you sir🙏
Tqqq
Hi bro, the videos are really awesome and helpful. Can you please upload lectures on HMAC, CMAC, DAA, CCM, GCM?
Thanks bhai
thank you so much
thank you ❤️😊
thanks brother😇
nice
👌👌
understood
Overall vedio was good ...but explain little bit slowly ..
If want to explain much more data ...just divide the vedio in two part ...thanks
You should need to join our university 😄 Awesome Video 👌🏻👌🏻
In Authentication tied to CIPHER , at receiver side , we decrypt the CIPHER , only to get the PAIN-TEXT & apply M.A.C FUNCTION , to M.A.C CODE in order to retrieve the MESSAGE only , hence there is no way to compare M.A.C value but comparison between MESSAGES retrieved from 2 ways occurs.
Good job if it's in English it will be more useful
SHA par bhi vedio banao
Thanks, brother you are doing a great job keep it up.
Can we expect video on SHA a bit soon exam on 13th
My exams are also going on so it is not possible as of now BRO
But still i will try 👍
@@AbhishekSharmaDit No problem brother you prep for your exam first. I will try from other sources.
No worries,
Sir authentication means verifying identity of sender 🙄🙄 Is the key unique for each sender???If the third part does change message then by comparison will become equal ???Still it also authentication???
Quantum se jo padh rha hai woh usse na padhe kripya yeh playlist save kar le
One doubt, as you mentioned at the start of the video, how come the hash function is used for authentication? It's meant for integrity right, hash function only generate fixed value, there is no sender and receiver authenticity
Hash function can also be used as to authenticate whether the data has been manipulated just before receiving by the receiver or not because in Hash, there are order / fixed bits are attached to the data so whenever a hacker will try to do the changes on the data sent by the Sender, that hash will also affect
Bahiia isn't Md5 and SHA and message digest algo part of the playlist?
Hello Abhisek, I hope you are doing well. I request you please make a video regarding client - server authentication deeply as I am confused with the public’s key of server and how they communicate if I want to send a message to server
Pls make video on Digital Forensic and Ethical hacking
Method and approaches same hogi kya kyaa message authentication ki????
Hash Function aur Hash Algorithm ki bhi video upload krde bhai kal paper hai....baki bhai tu bhut acha kaam kr rha hai!!
Even i have my exam tomorrow so impossible bro
@@AbhishekSharmaDit All the best bro
Bro can you tell which exam did you gave pls can you guide me I am in 10th idk what I want to take in 11th pls guide me bro. And pls tell I really want to build my carrier in this field pls tell
jab exam ke time koi kisika nhi hota, tab youtube pe aise bhagwan log mil hi jate hai....
Shi bola bro
do you have any well defined pdf of your notes on the internet? Any link?
in authentication tied to cipher, we should send only cipher to get msg back right? not the combination of cipher and mac.....
Yes, you are right ...He has mistakenly taken the arrow from MAC for decryption. It should be from Cipher.
Yes, exactly
PGP pe bhi video bana lo
hello sir
plz solve the equation p = 10 q = 10 e = 7 and PT = 9 RSA
Bhai ..agar msg pd rhe ho to request hai ....X.509 authentication service ...pr detail mai video bnado in hindi
Could you cam scan and upload notes ?
Sir mujhe apke videos download krne Hai plzz Help me
Then what is different between Mac and hash function?
Integrity bhi milti hai Na MAC se??
Please post Kerberos video sir before 4/1/23 please sir
can you provide this material .
Pls translate tamil video. Sir message authentication
bhai samjahte sahi ho ,but bht speed mae bolte ho aap
Speed 0.75x krlo ya 0.5x krlo
@7:12 a timestamp for me
Bhai aapke notes ki pdf upload kar de
Bhai HashFunction ki bhi upload kardo kal exam hai.
Even i have my exam tomorrow 😂
So it is impossible
@@AbhishekSharmaDit never mind ..
Why do you have an english title but a different spoken language ? Just write it in the title please
Can i get pdf of your notes??
I also want the pdf of this copy
No.
Sath sath me khud hi bana lo… thoda to efforts dalna padega
Sss marlo be
Yes
Message with Key1 = MAC
Sender side : (Message+MAC)-> Encryption with Key2= [Cypher Message]
Receiver Side: [Cypher Message]
Speak slowly please
Vo sb to thik hai... But bolte bhut jldi ho jese koi mar ke bhga rha hai... Ap ispr kamm kripa vhin ruki hai..
bhai yha toh mai 2x mai dekh rha hu toh bhi dikkat nhi aa rhi
Ap 0.75 ya 0.5x speed pr dekho