Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Sdílet
Vložit
  • čas přidán 3. 10. 2021
  • Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is provided using a Hashing Algorithm... but not simply by itself, that leaves you open to an attacker modifying your message and re-calculating the digest. Instead, something else must be done in addition to Hashing.
    In this video, we discuss that "something else". This will have us introduce the concept of a Message Authentication Code (MAC), and the most common implementation of a MAC known as the HMAC (Hash Based Message Authentication Code).
    This lesson is a free sample lesson from the the most effective TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
    🔐 More details about the course:
    classes.pracnet.net/courses/p...
    🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
    💬 Join Practical Networking Discord
    / discord
    🖧 Want to learn how how data moves through a network?
    • Networking Fundamentals
    Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
    YT100
  • Věda a technologie

Komentáře • 82

  • @PracticalNetworking
    @PracticalNetworking  Před 2 lety +4

    👉 *More free lessons:* czcams.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html
    ✨ *Full course:* pracnet.net/tls
    💲 *Coupon Code* for 50% off: youtube50

  • @techhack8367
    @techhack8367 Před 2 lety +14

    The Best Teacher I've ever seen in my lifetime!💯😍

  • @DeRizzlo
    @DeRizzlo Před 4 měsíci +1

    this video basically explained to me what my entire 3h lecture was tryna say but failed horribly. CZcams is crazy for educational videos like these!! thank you so much

  • @Eonwe
    @Eonwe Před 2 lety +9

    I’m binging your vids this weekend. Your explanation of how ports work and why they exist was so clear and easy to grasp that I’ve been completely sucked down this rabbit hole of your videos. You’d be amazing at explaining how the Bitcoin network works.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +1

      Glad you've been enjoying the content, Eönwe =). Bitcoin (and related concepts) are on my list to talk through at some point. At the moment I'm trying to market my TLS course: classes.pracnet.net/courses/practical-tls
      Thanks for the kind words =)

  • @piratevv
    @piratevv Před 2 lety +3

    Thanks for these. These are Gold. I am seeing networking now with much a solid path to troubleshoot and know what really is happening!!!

  • @sergiopimentel1479
    @sergiopimentel1479 Před rokem +4

    Hey man, I just want to thank you for uploading these videos, they have been of incredible help. There are a few videos out on CZcams but honestly, yours are the only ones I can learn from, I'm an audiovisual learner so again Thank you!

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      Thanks for the kind words, Sergio. Glad you're getting so much from this content =). Cheers !

  • @patrickherbert_
    @patrickherbert_ Před 5 měsíci

    Thank you for taking the time to explain this. I've almost given up understanding the concept. Most websites I read it got me more confused than I was. It's clearer now

  • @niyeamerika
    @niyeamerika Před měsícem

    Thank you. You have the best explanations on the subject. 🙏👍

  • @ajayb9392
    @ajayb9392 Před 2 lety +2

    Awesome explanation👍 You're the best in making things simple. I can never stop watching your videos.

  • @adedejiemmanuel1
    @adedejiemmanuel1 Před 2 lety +2

    Another great one. Teaching with passion and conviction. I am your believer. Thank you.

  • @theegg5492
    @theegg5492 Před 9 měsíci

    Thx for the best explanation I’ve seen in months. Helped me a lot. 🙂

  • @skellybin
    @skellybin Před 3 měsíci

    I was thinking of this very hard while working on my simple secure communication protocol project. Thank God I understand now

  • @saravanamanivannan3225
    @saravanamanivannan3225 Před 4 měsíci +2

    If you are following the entire series, remember that he mentioned that Integrity and Authentication provide Non-repudiation as a byproduct. However, that principle does not work in this scenario. Why? Because in HMAC, the use of the same secret key eliminates non-repudiation. In order to achieve non-repudiation, the sender and receiver must use asymmetric keys (a different pair of keys for encryption and decryption).

  • @iliandrei1408
    @iliandrei1408 Před 2 lety +1

    That's soo nice, great way to understand how important it's the data integrity in the modern world. Thank's to you I am beginning to get more into networking

  • @PracticalNetworking
    @PracticalNetworking  Před 2 lety +3

    🥳🥳- Promotion Ended - Congrats @Pratik Dhame and @Mehul 🥳🥳
    For the rest of you, you can use this discount code for $100 off the course: YT100
    classes.pracnet.net/courses/practical-tls
    Subscribe + Notification bell to increase your odds of winning when the next video (and giveaway) releases!
    📢📢 FREE COURSE GIVEAWAY 📢📢
    A random 2 people from the first 25 who comment on this video will be selected to gain free access to the Practical TLS course: classes.pracnet.net/courses/practical-tls -- Good luck everyone =)

    • @Don-Carillo
      @Don-Carillo Před 2 lety +1

      Thanks again. Read so many security plus books and none of them explain it as well as you . Cheers

    • @pratikdhame
      @pratikdhame Před 2 lety

      Congrats , thank you

    • @pratikdhame
      @pratikdhame Před 2 lety +1

      Thanks for the great class

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      @@pratikdhame You're welcome!

  • @guilhermereis8153
    @guilhermereis8153 Před 2 lety +1

    Thanks for explaning how hash works, hugs from Brazil!

  • @silentrandom
    @silentrandom Před 11 měsíci +1

    Pretty neat stuff. Thanks for sharing the videos.

  • @addie8171
    @addie8171 Před 2 lety +1

    Thank you for providing this information, it is very helpful and well explained.

  • @VideosfromElle
    @VideosfromElle Před 2 lety +1

    This is the definition of crystal clear, and an encouraging way to ultimately F with bahd guyz

  • @nageswararaovekkanti4110
    @nageswararaovekkanti4110 Před 2 lety +1

    Excellent and really useful. Really good content as usual.. Thank you so much !!!

  • @hosseinshourabi398
    @hosseinshourabi398 Před rokem +1

    I'm enjoying to see these videos,
    Thanks a lot Ed,

  • @Nunesi
    @Nunesi Před rokem +1

    Great video as always. Thank you a lot🙏🏻❤️🌷

  • @marekgalbavy4408
    @marekgalbavy4408 Před 2 lety +2

    Great video, thx for help, i am preparing for certification and yours video help me a lot.

  • @satinaklunder7170
    @satinaklunder7170 Před rokem +1

    Thank you very much. Very understandable.

  • @jackyyeh1991
    @jackyyeh1991 Před 2 lety +2

    Finally, know how it works from this video

  • @adedejiemmanuel1
    @adedejiemmanuel1 Před 2 lety +1

    Yes, I enjoyed it!!

  • @IliyaDamyanov
    @IliyaDamyanov Před 8 měsíci

    Very very good video.

  • @rodica5065
    @rodica5065 Před 2 lety +1

    Thanks just looking for this explanation

  • @prateekalmighty
    @prateekalmighty Před 11 měsíci +1

    Yes thanks for this video

  • @Gcpaws8608
    @Gcpaws8608 Před rokem +1

    excellent!

  • @krislier22
    @krislier22 Před 2 lety +1

    beautiful thank you

  • @spearchew
    @spearchew Před 2 lety +1

    excellent video

  • @GreenMan42O
    @GreenMan42O Před 2 lety +2

    This explains the "Key direction" parameter when an additional HMAC authentication is enabled during OpenVPN configuration.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +1

      Yep! Exactly. Can't do an HMAC without a Secret Key. If you aren't manually providing the key, then one has to be produced from an Asymmetric Encryption algorithm (which I'm releasing a video about next week!)

  • @ayradizem2770
    @ayradizem2770 Před 2 lety +1

    Thank you

  • @OK-ri8eu
    @OK-ri8eu Před 2 měsíci

    man, thanks. really

  • @pratikdhame
    @pratikdhame Před 2 lety +1

    Just awesome 😄 ❤️

  • @glenngeorgewoolley
    @glenngeorgewoolley Před rokem +2

    Hi thanks so much for this explanation!
    Just one thing I’m struggling with, if hashing cannot be reversed, and we use hmac to send data securely, then how does the receive see the original text before hashing? Is two sets of the same data sent, one in plain text and the other hmac? Thanks so much

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +2

      > Is two sets of the same data sent, one in plain text and the other hmac?
      Yes! Exactly. Both the plain text message, and the HMAC digest are sent.
      This provides *Integrity* but not *Confidentiality* -- see the other videos in this series to understand what I mean by that. Cheers =)

  • @mehulpruthi
    @mehulpruthi Před 2 lety +1

    Great explanation. I am interested in the Giveaway of this amazing course. Thanks..

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +1

      Good luck! =)

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +1

      Congratulations, you're a winner! Reach out to me on discord to claim free access to the course: pracnet.net/discord

    • @mehulpruthi
      @mehulpruthi Před 2 lety +1

      @@PracticalNetworking Thank you so much for selecting me for the course.

  • @RT-kk2gk
    @RT-kk2gk Před 2 lety +1

    So are they different??The hashing algorithm and the HMAC???I mean we can use this or that ??Thanks alot.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Yes, they are different. You can do an HMAC with MD5, or with SHA1, or with SHA256, and so on. You can also do an HMAC, or a KMAC, or CMAC, etc...
      The hashing algorithm is different & independent from the "method to combine hashing + secret key"

  • @siddharthmanumusic
    @siddharthmanumusic Před 10 měsíci +1

    Is the key concatenated with the message or is the message encrypted with the same key? That is not clear.

    • @PracticalNetworking
      @PracticalNetworking  Před 9 měsíci

      For the sake of this video, we'll say the Key is concatenated with the video. But in reality, the HMAC operation is a little more complicated
      In a real HMAC, the key is combined with the message multiple times. The real formula is listed in section 2 of RFC 2104: www.rfc-editor.org/rfc/rfc2104.html#section-2

  • @user-eg5kn9qq3r
    @user-eg5kn9qq3r Před 2 lety +1

    Didn't got on how hmac will save the integrity of the message as key, message and digest all can be changed and receiver won't come to know.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +3

      The key is used to calculate the digest. The receiver is also using the key to calculate the digest.
      An attacker in the middle can still change the message, but can not re-calculate a digest which the receiver will accept since the attacker can not combine the key with the modified message.

    • @user-eg5kn9qq3r
      @user-eg5kn9qq3r Před 2 lety

      @@PracticalNetworking Thanks for quick reply, got it.

  • @nimaforoughi3008
    @nimaforoughi3008 Před rokem

    In layperson terms

  • @jcc5566
    @jcc5566 Před 10 měsíci +1

    26,507 views Oct 4, 2021 Practical TLS - Free Lessons from my SSL Deep Dive training course
    Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is provided using a Hashing Algorithm... but not simply by itself, that leaves you open to an attacker modifying your message and re-calculating the digest. Instead, something else must be done in addition to Hashing.
    In this video, we discuss that "something else". This will have us introduce the concept of a Message Authentication Code (MAC), and the most common implementation of a MAC known as the HMAC (Hash Based Message Authentication Code).
    This lesson is a free sample lesson from the the most effective TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
    🔐 More details about the course:
    classes.pracnet.net/courses/p...
    🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
    💬 Join Practical Networking Discord
    discord.com/invite/yrexngJ
    🖧 Want to learn how how data moves through a network?

    • Networking Fundam...
    Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
    YT100
    Key moments
    View all
    Featured playlist
    24 videos
    Practical TLS - Free Lessons from my SSL Deep Dive training course
    Practical Networking
    Practical Networking
    166K subscribers
    Videos
    About
    11:42
    Hashing, Hashing Algorithms, and Collisions - Cryptography - Practical TLS
    by Practical Networking
    33K views · 1 year ago
    7:34
    What is SSL & TLS ? What is HTTPS ? What is an SSL VPN? - Practical TLS
    by Practical Networking
    93K views · 2 years ago
    5:15
    How do SSL & TLS protect your Data? - Confidentiality, Integrity, Authentication - Practical TLS
    by Practical Networking
    38K views · 2 years ago
    Practical TLS
    Learn more about Practical TLS ty so much :)
    Pinned by Practical Networking
    @PracticalNetworking
    1 year ago (edited)
    📢 ANNOUNCEMENT: I'm adding 20+ new lessons to the Practical TLS course covering TLS 1.3.
    💲 While creating the TLS 1.3 modules, I'm discounting my Practical TLS course to the lowest price I have ever offered until I finish.
    📣 Coupon Code: PracticalTLS13 || Promotion Price: $49 (Regular Price $297)
    👉 classes.pracnet.net/courses/practical-tls/buy?coupon=PracticalTLS13
    The Course returns to full price as soon as I publish the final TLS 1.3 lesson. Don't wait too long. =)