NETWORK SECURITY - SHA 512 (AUTHENTICATION ALGORITHM)
Vložit
- čas přidán 2. 08. 2024
- SHA 512 (SECURE HASH ALGORITHM)
1) PAD WITH THE BITS 100..... UNTIL LENGTH OF PLAIN TEXT REACHES 128 LESS THAN MULTIPLE OF 1024 BITS
2) APPEND 128 BIT REPRESENTATION OF ORIGINAL PLAIN TEXT MESSAGE SO THAT LENGTH EQUALS TO MULTIPLE OF 1024
3) INITIALIZE 8 BUFFERS OF SIZE 64 BITS EACH TO STORE INTERMEDIATE RESULTS AND FINAL HASH CODE.
4) PROCESS EACH 1024 BIT BLOCK IN 80 ROUNDS.
5) OUTPUT IN BUFFERS IS THE 512 BIT HASH CODE
sir , you explain very clearly and salute to your efforts. You take print out of all diagram and explain it . I wish professors in engineering colleges in India should be like you.
HATS OFF SIR towards your DEDICATION HATS OFF!!!!! Thank you so much for simplifying and teaching us the contents thank you!!!!!! BEST TEACHER EVER!!!
Studying for a cryptography final and this was really helpful. Thank you for providing your explanation of SHA-512.
Kindly Note:
Digest Length of SHA-1 is 160 bits, not 128 bits.
exactly
Video starts at 4:15 .
Tq bro👍
Superb Sir! This is the first time known about SHA algorithm. Now i got concept and process. Thanks for giving detail explanation. Thank you sir.
I have seen your video till @24:39, & it is very helpful for me to understand the concept, Thank you so much
Best video about SHA512. Thank you!
Sir you must reduce the length because many of student watch it during exam we don't have time to view one hour video for just one topic.... Even if we increase the playback speed its still to long...
Bro wants small videos because he messed up his study schedule.
Thank u sir, because of u I passed cg,I didn't know shit about it earlier, didn't know where to begin..but u just made things so easy... thanks again..gr8 work
hi Neil thanks for watching my sessions and your interest towards our channel.
Sir you are best teacher I have ever seen online. Your concepts are really very strong.
hi Rishabh
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Thanks a lot for the video, its clearly understandable !
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
Sir your explanation and efforts are mind blowing.
Sir, it was of great help thank you so much for your dedication sir.
hi mrudula
thanks for watching my sessions and interest towards our channel.
Thank you for the explaination!
Sir thank you sooo much. I good mark because of you. God bless you
Well Explained Sir ...Great lesson learnt..
Awesome explanation sir👍👍 whole concept clear.
Very helpful, Thank you sir!
Kamal samjata hain sir ap :)
Tq so much sir....I watched all ur networking vedios....exllent lecturing....ur a good teacher...sir
we are very grateful to have you sir thankyou very much sir
Thank you sir....For your brief explanation
Ur classes are very effective....very understanding...easily understandable
thank you
I understood the whole concept but it's hard to remember all the formulas thank u sir!
hi vamshi
nice and thats correct its some what difficult to remember formula.
thanks for watching my sessions and interest towards our channel.
Vedios are very helpful sir ...thanq
Best playlist for this subject
Thank you 🙏 sir
thankyou sir Iam unable to say thankyou to you sir continuously hope you understand of need of your videos sir
massive salute to you, Sir !
hi amar
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Excellent explanation sir!!
Sir I am a faculty in B.E. and I love the way you explain every small detail in an easy manner. I follow your pattern of teaching and it’s a huge success. Sir could you please upload a video on SHA-256 algorithm.
Thank you so much Sir . You have explained very well .
Thankyou sir.. you explained this topic very well I was able to understand it very well 😊
Simply superb.
Sir, you keep your video length like this no matter instant videos sir later on you will get a very best appreciation of subscribers and views in a long time.
Excellent explanation. Thanks sir
Nice video, helped me understanding SHA algorithm
hi hima
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Hello Sir, could you please clarify it more with an example ?
Thank you
your videos are perfect for me.
hatsoff!!! sir.....as clear as crystal .....!
Very helpful tutorial, Thank you sir
best wishes
thank you so much.
Sir, your explanation is really good! But please try to reduce the length of your video so that you get more views. Thank you! This video was really helpful.
hi amey thanks for watching my sessions and support towards our channel
every one may not understand like you and repetition will make the user more understand particularly for the slow learners.
Just increase the playback speed if you want to listen faster bro
he just follows Flow Control Service :))
Its okay Amey , i watch in 1.5 playback speed😂
Appreciated!!!!
NICE SUPER EXCELLENT MOTIVATED
if u explain with real time practical values then its easy to understand in research side prof
You are awesome sir
thnakyou so much sir
very great explanation
Very important video, Great thanks for your dedication, Sir, would you please upload a video on SHA-1?Algorithm
Thank you sir.. Very useful..
Best Explaination
Hi Sir , thank you for the explanation, can you add some examples also. so that the working will understand much more specifically
Very useful sir
Sir really helpful
Wow, your video is awesome. very indepth explaination. But i need one more video with example of message "I love india" or some "hex value message" from sender node to receiver node. If you explain the same concept with example, that would give next level dimension to understand the concept to core.
Well explained sir
Great Video
Explain the operation of SHA-3 with the help of block diagram. List advantages of using
SHA 3 over SHA 2 and MD 5.
Thanks a lot sir
Nice tuitorial
Great cours, i added your channel in my favorites...
hi Bensaleh
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
Sir, please provide your notes which was used by you during the explanation,so it will be more helpful for us,many of the diagram are not provided in any of the books,and explanation was really nice,many of the topic are not in the book also....there is a little bit of explanation in the book.so sir please try to provide the notes
Thank You
SHA-1 gives an output of length 160 bits. In the explanation it is mentioned as 128 bit output.
hi niharika sai
first thing this algorithm is not SHA-1 but it is SHA-512
The output of this algorithm is 512 bit hash code
and in the second step we have to append the 128 bit representation of a plain text. and it is not the hash code.
hope your doubt has been clarified.
Sundeep Saradhi Kanthety At 4:26 it's about SHA-1
Hi Niharika
nice observation and really i didn't observe that and i am sorry for the mistake and you are correct it should be 160 bit. thanks for correction.
One zero two four is called one thousand twenty four 😅 ❤ Great course sir, Greetings from Europe
sir please upload a video on SHA-1 Algorithm
Very helpful
please post something on elliptic curve cryptography
Hi Sir , thank you for the explanation. does it means do we have possibility to extract plain test from hash code?
As Hash code will be tightly coupled to each bit of plain test?
Sir, please upload a video on Epileptic Curve Cryptography
hi mainak
i will try to do that.
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Sir, Please upload the video lecture wise ie. request to provide numbers to the lecture.
It will be helpful to both the students who are either learning this from very basics or want to switch from one lecture to another.
hi sumeet
i am uploading the videos in order and if you watch the play list it will be arranged in a stack order that means latest video will be uploaded in the beginning.
आनंद आ गया
Thanks sir
I'm following this whole series and genuinely one the best video on youtube
but i have few suggestion :
1) instead to holding a paper in front of camera, better add the pic into PPT file and then screen-record it and at the end append to screen recorded video with the video..
2) Add numbering to videos sometimes it make confusion for the viewers where to begin and end :)
hi ashutosh kale
you are correct and i will agree with you and from the next video i will change this format.
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
What is the round function in SHA algorithm? what does the round function do? what operation does it do on initialization vector which we call it buffer and 1024 bits?
Thanks a lot Sir. You have explained it wonderfully
hi rajasree
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Sir ur videos are very good with clear explanation if possible please explain. What is message digests with clear explanations
Hi Karuna
Thanks for your interest and coming to message digest it is an authentication technique. User will calculate fixed length value from the given plain text and it will be appended to the plain text and sent to the receiver so that at the receiver end the same process will be done for finding fixed length value from message digest and it will be compared with the appended value, if both matches then it seems no modification during transmission. If both are not equal the there might be modification during transmission. Hope your doubt has been clarified.
Hello, your explanation is really good. But in this lecture, it is mentioned that the hashing algorithm is used to authenticate the message sent, but in my view hashing techniques are used to check the integrity of the message but not to authenticate the message. To enable any authentication Key (asymmetric or symmetric) concepts will be applied. Please clarify my question.
yes hashing is for integrity
hats off sir
Tq sir for this video..sir please can u explain how to execute these programs with required packages in java
those 80 constants are not randomly generated using ant pseudo random number generator.....those are genrated by converting the "fractional part" of the cubic root of the first 80 prime numbers ( 2,3,5,.....409) into HEXADECIMAL format
Sir can you please make a vedio for SHA 1
Sir your explanation is very excellent, but i need sha3 algorithm , pls explain sir
Great video...If u reduce the length of videos to 20min U will get many more views...thank you!
hi siddharth
i will agree with that.but it would be better for the slow learners if we repeat the topic twice.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Hi Sir
You are very good teacher
I need Solution for how can I convert rolling code 512 digits pincode to 128 digits outcode
sir it will be of great help if you could upload md5 and elliptic cryptography
hi remya unnikrishnan
sure and i will try to upload them soon.
SIR STILL WAITING ..FOR THE UPLOAD...
when you are padding the bits, should you pad 100 zeroes or pad it in a way of concatenating text?
hi
padding means adding dummy bits that makes difference in length for our algorithm.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
thnx :)
sha1 is 160bit so correct it , you have written 128 bit.
but sir sha1 produce output 160bit
and
md5 produce output 128 bit....
md5 produces 32 bit output
Sir ,
what is the Initial Value of buffer
a b c d e f g h ???
Some values like fractional part of square or cube root of a prime number
Could you explain elliptical curve cryptography
hi vishwath
definitely i will try to upload it soon.
Sir, is it almost same as MD5 algorithm ?
Sir, Great video but
just a correction needed.
Rotation Functions are not according to NIST Standard
that should be
Rotate(A) = RotR28(A) XOR RotR34(A) XOR RotR39(A)
Rotate(E) = RotR14(E) XOR RotR18(E) XOR RotR41(E)
hi goel
thanks for the correction keep following our channel and support me by correcting my mistakes.finally viewers should be benefited.
Thanks again for the correct information.
sir for sha1 output is 160bitsize
👌👌
hi remya unnikrishnan
thanks for watching my sessions and interest towards our channel.
sir I got SHA-1 for my exam can I write the same architecture of SHA-512 and just mentioning the output as 160bits ..?
Sir please make a video on MD5 message digest algorithm
hi shilpi jain
definitely with in couple of days i will upload the video on MD5. Let me complete the syllabus of our college and then i will start uploading the concepts of MD5,IDEA and BLOWFISH algorithms.
Sundeep Saradhi thanks
sir can we have these notes form which you are explaining
How to pad if length of plaintext is 1020 bits
what is the 128 bit representation of message. how to generate it?
sir plz upload sha256 algorithm