Hash Functions in Cryptography

Sdílet
Vložit
  • čas přidán 5. 12. 2019
  • #HashFunctions #Cryptography #NetworkSecurity #HashFunction #CryptographyAndNetworkSecurity
    message authentication
    • Authentication functio...
    MAC
    • MAC in Cryptography ||...
    hash function in Cryptography and network security

Komentáře • 177

  • @PiyushKumar-ec4uc
    @PiyushKumar-ec4uc Před rokem +143

    200 like krwa deta hun soch k like karne aya fir dekha bhai bahut aage nikal gya hai 😂😂😂😂

    • @farhansarguroh8680
      @farhansarguroh8680 Před rokem +3

      Us bhai us😂

    • @TechLa-69
      @TechLa-69 Před 7 měsíci +4

      Ab to lgta h kuch din me is comment p 200 like aa jayenge

    • @mishrabhishek
      @mishrabhishek Před 6 měsíci +2

      ​@@TechLa-69 yahi bolne ja ra tha dekha ye koi pehle hi bol chuka hai

    • @VishalKumar-lw3yh
      @VishalKumar-lw3yh Před měsícem

      😂😂😂😂😂😂🗿🗿🗿🗿🗿🗿

  • @naeemaibrahim1645
    @naeemaibrahim1645 Před 4 lety +39

    You break down things beautifully! Thank you!

  • @priyansimishra1961
    @priyansimishra1961 Před rokem +4

    Bhai ajj abhi 4baje exam h and mujhe sab concept samjh mein aa raha h... thank you so much...but my bad mujhe pehle kyun nhi apka vdo Mila ...I can not complete all your videos because only 1hr left ...so thank you so much jitna bhi hua😊

  • @rohitmakawana7726
    @rohitmakawana7726 Před rokem +3

    Mind blowing Sir , You don't know but This is the Bestest Video In CZcams To Understand Hash Function ❤❤❤

  • @Fatiii
    @Fatiii Před 2 lety +8

    You perfectly know how to explain 👌👍👍👍👍👍👍👍👍keep up the good work , explanation was great

  • @sunnynuri7191
    @sunnynuri7191 Před 4 lety +7

    One of the best video on hash functions

  • @ShravanS
    @ShravanS Před 3 lety +70

    Just need your notes bro 🥺. Amazing teaching !!!

  • @BhushanBankar-iz8kq
    @BhushanBankar-iz8kq Před 3 měsíci +1

    Thank you so much, sir ....... I cleared 7 sem university exam subject which is Cryptography and network security.... your videos and your knowledge are helpful to me ....

  • @shifaahmad2171
    @shifaahmad2171 Před 9 měsíci

    you are the best tutor of information security on you tube

  • @siddhi1993
    @siddhi1993 Před 3 lety +5

    your voice is so sweet. I hear every words and understand everything. thank you! :)

  • @bishikamagoo5119
    @bishikamagoo5119 Před rokem +3

    Thank you, your notes really helped me for preparation

  • @NotNextron
    @NotNextron Před 3 lety +8

    ❤️ UR VIDEOS ARE JUST INCREDIBLE THNX IT HELPED ME FOR MY MCQ XAMS👍

  • @omajaybhavsar8039
    @omajaybhavsar8039 Před 2 lety +1

    Great help before exams :) whole hearted Thanks!!

  • @kunalsoni7681
    @kunalsoni7681 Před 4 lety +4

    Really aap toh bhot acche se samjhate ho really ☺️😊 thanks for This video

  • @afrida3351
    @afrida3351 Před 3 lety +15

    Great explanation! Thank you so much! It helps a lot!

    • @farhanbhutta9587
      @farhanbhutta9587 Před 2 měsíci

      Great explanation! Thank you so much! It helps a lot

  • @xyz-pc3tl
    @xyz-pc3tl Před 2 lety +3

    Thanks a lot bhiya for your all hardwork and efforts..🎊🙏💐

  • @bhadrik
    @bhadrik Před 3 lety +2

    Simple as that, thank you

  • @armylove9733
    @armylove9733 Před 2 lety +2

    I have 1 doubt. Authentication by the public key of A and Integrity by hash is the same or not, is it true?

  • @nityodaytekchandani701
    @nityodaytekchandani701 Před rokem +3

    Thank you my man!!

  • @yutaitadori7318
    @yutaitadori7318 Před 4 lety +3

    Thanks ❤️ well explained

  • @aditisheikh2884
    @aditisheikh2884 Před 3 lety +5

    You just saved my exam ❤️

  • @lalit3452
    @lalit3452 Před 2 lety +2

    amazing teaching brother

  • @madamlalarr1119
    @madamlalarr1119 Před 3 lety +2

    How can we use hash function to design a secure login to prevent eavesdropping?

  • @manasabs5384
    @manasabs5384 Před rokem +3

    Really good explanation 🙌

  • @SUMITSINGH-jx1zh
    @SUMITSINGH-jx1zh Před 4 lety +2

    you nailed it bro

  • @samiranroyy1700
    @samiranroyy1700 Před měsícem +1

    Thanks sir ❤for this...❤❤i watched the full series..
    Thanks a lot sir ❤❤❤❤❤❤❤

  • @pratikshyapaudel3065
    @pratikshyapaudel3065 Před 2 lety

    Thank you brother for this vedio from Nepal

  • @a8488vv
    @a8488vv Před 2 lety +1

    Amazing explanation sir

  • @ANKITVERMA-fl1zn
    @ANKITVERMA-fl1zn Před 3 lety

    Watch it 2x you will hear munna bhaiya voice from Mirzapur believe me. btw great work.

  • @dav-mps-parsa
    @dav-mps-parsa Před rokem +1

    Which books i can mention as refrece for this description??

  • @sanjoysingha4020
    @sanjoysingha4020 Před 3 lety

    Simple si cheej ko aur complex kar diya bhai tuney

  • @nandinimishra9153
    @nandinimishra9153 Před 2 lety

    when blue color pen u use for making notes?

  • @kshitijvarma2566
    @kshitijvarma2566 Před 9 měsíci +1

    thank you bhaiyaa.... have a great day

  • @comedyadda7269
    @comedyadda7269 Před měsícem +2

    Thanks sir 🙏❤

  • @nirajshivane402
    @nirajshivane402 Před 10 měsíci +1

    thank u sir and happy teachers day

  • @Findingvibes08
    @Findingvibes08 Před 4 lety +2

    Best explaining

  • @Rin-dk1oo
    @Rin-dk1oo Před 2 lety +4

    like ka aim rakhte hai 200 likes gets 140k views and 4.5k likes.. you deserve more though :D

  • @mohammedzabiulla310
    @mohammedzabiulla310 Před 3 lety +1

    Thank you brother

  • @rohitvishwkarma8076
    @rohitvishwkarma8076 Před rokem +2

    very helpful
    Thankyou

  • @dhaneshpt8641
    @dhaneshpt8641 Před 10 měsíci +2

    Thank you..

  • @mohsinimran3895
    @mohsinimran3895 Před 2 lety

    love your video all the way from london (

  • @expertforexandbinary676
    @expertforexandbinary676 Před rokem +2

    How we find coefficient of Secure hash algorithm??? Or how we crack Secure hash algorithm????
    These two questions. Please answer???

  • @jahanvi9429
    @jahanvi9429 Před rokem +1

    thank you

  • @puneetmishra9745
    @puneetmishra9745 Před 4 lety +2

    Inme say kis method. Ko paper me likh kay au ..? Mera 8 jan ko. Paper hai please help

  • @sachinsharma-dd9zh
    @sachinsharma-dd9zh Před 3 lety +1

    Very nice explanation bro👍👍....but yr ek tiger hash or gear hash pe video bnaa do plz..syllabus me mention hai kuk ke

  • @siddhantsingh6578
    @siddhantsingh6578 Před 3 lety +5

    16:21 hmne attacker ko jhand kr diya😂

  • @abdullahhussain9455
    @abdullahhussain9455 Před 2 lety

    Thank you

  • @stutijain9254
    @stutijain9254 Před rokem +2

    Can you pls make a playlist for distributed systems? You teach amazing

  • @ayushjungkarki2896
    @ayushjungkarki2896 Před 4 lety +11

    bro need more videos on cryptography
    love form nepal

  • @graphic_designer35
    @graphic_designer35 Před rokem

    JAZAK ALLAH sir

  • @lakshayjain9337
    @lakshayjain9337 Před rokem +1

    Nicee tysm ❤️😎

  • @kdsouza4507
    @kdsouza4507 Před rokem

    Thank you so much sir

  • @saumyajaiswal6585
    @saumyajaiswal6585 Před rokem +2

    16:20 Hamne apne attacker ko ek tarah se jhand kardiya😂😂

  • @divyathakur7927
    @divyathakur7927 Před 3 lety +1

    Superbb🤟🤟

  • @minttobe4081
    @minttobe4081 Před 2 lety +1

    What amazing 🙂🙂🙂🙂

  • @ranaahsaan4663
    @ranaahsaan4663 Před 2 lety

    Rana Ahsaanullah
    Very good

  • @AMANRAJ-rd7iy
    @AMANRAJ-rd7iy Před 2 lety

    Thanku so much

  • @learnfrompast
    @learnfrompast Před 2 lety +7

    why did u use private key to encrypt the hash value ....as we should use public key to encrypt the msg or hash value ......plz explain

  • @manaskhatri5803
    @manaskhatri5803 Před rokem +1

    Today is my major exam and I am watching this now

  • @wardanaveed4240
    @wardanaveed4240 Před 5 měsíci +2

    Mene sha algorithm search kiya ha ye video nikli ha please koi guide krdy ye wahi ha ya nai?

    • @lucifer_netflix
      @lucifer_netflix Před 2 měsíci +1

      Ab to 3 mahiny ho gy guide kru ya na kru😅

  • @anuragtiwari2511
    @anuragtiwari2511 Před 3 lety +1

    you are doing great job man! Respect++

  • @sakshibkotian4049
    @sakshibkotian4049 Před 2 lety +1

    Can u explain the properties of hash function?

  • @namanagarwal5687
    @namanagarwal5687 Před 4 lety +1

    Superb

  • @subhajitpanda2817
    @subhajitpanda2817 Před měsícem

    Sir your video is very very helpful , can you please provide the handwritten notes that you explain in your video.

  • @LOKI-vn8qp
    @LOKI-vn8qp Před 3 lety +1

    These are the types of hash functions ??

  • @Aam-admi2424
    @Aam-admi2424 Před 4 lety +3

    U said key does not use in hash function at 1.11 but u explained with the help of key for encryption and decryption, how it is ??

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +11

      Hash function me koi key nahi use hui h
      Key is only used after hame apna hashcode mil gyaa h after passing the msg throught the hash function
      And
      Ya to ham key encryption algo me use karre h to encrypt our msg
      I hope now samajh me agya hoga
      ✌️💯

  • @gajjardhruvil9271
    @gajjardhruvil9271 Před 4 lety +1

    very good sir i clear all concept of cryptography

  • @mdafsarali9564
    @mdafsarali9564 Před 8 měsíci

    why we need to write 5...6 methods for hash function? can we define two method in exam?

  • @mohammedjaveed8257
    @mohammedjaveed8257 Před 19 dny

    You are so good but explanation is fast make it slightly slow

  • @hooriakhan4112
    @hooriakhan4112 Před 2 lety

    Bro kerberos ki video nhi mil rhi..! Did you made any video on that?

  • @masoncrisp4821
    @masoncrisp4821 Před 2 lety

    I play your vids whenever my nephews and nieces come over and watch annoying tiktoks over and over and over......they met there match......

    • @rishirajsinghrathorepgi19c56
      @rishirajsinghrathorepgi19c56 Před 2 lety

      mason chips ohh sorry crisp maybe you should also start doing tiktok by this you will not do this shit talk here in comments ;

  • @anujkanojia1450
    @anujkanojia1450 Před rokem +1

    @abhishek bhai notes ki pdf link send krdo..

  • @kumarshivam3661
    @kumarshivam3661 Před rokem +2

    Great explaination

  • @izzatyaseen4013
    @izzatyaseen4013 Před 3 lety +1

    Nice

  • @SurajKumar-np6zz
    @SurajKumar-np6zz Před 4 měsíci

    Bhai ek lucky jet game hai uska sha 512 algorithm use hota hai usko kaise follow kare jaise

  • @shekharhumane8874
    @shekharhumane8874 Před 2 lety

    Masta✌️

  • @simranraturi3373
    @simranraturi3373 Před rokem +1

  • @subhamkumarsah933
    @subhamkumarsah933 Před 4 lety

    Bhaiya ap ek heap sort algorithm ke upar video bna dijiyena pls.. 13 ko exam hai mera

  • @digvijaypatil860
    @digvijaypatil860 Před rokem +1

    Bro please video on DSS approach

  • @samarthkvlogs8611
    @samarthkvlogs8611 Před rokem

    pls repky i m very confused what are types of hash function ?????

  • @md.saifulislam5048
    @md.saifulislam5048 Před rokem +2

    I wish if my course teacher saw this video

  • @vedangjani2412
    @vedangjani2412 Před 2 lety

    thank you bro.. great work and teri notes ki pdf send karna link mai...

  • @surendersharma3000
    @surendersharma3000 Před 2 lety

    aWESOME

  • @snehanandu8574
    @snehanandu8574 Před 2 lety

    Its too good but hashing mein to key use nahi karte h na ?

  • @UmerKhan-ro3dy
    @UmerKhan-ro3dy Před 6 měsíci

    ❤❤

  • @ajayakumarnayak1589
    @ajayakumarnayak1589 Před 2 lety

    just wow

  • @navdeepsingh5649
    @navdeepsingh5649 Před 4 lety +2

    bro i neeed answer of this question:- hashing is useful tool in
    (a)prevention of unauthorized file modification
    (b)the development of secure cryptography algorithm

  • @bharathnreddy4590
    @bharathnreddy4590 Před 11 měsíci

    Any one method can write or all the methods should write 😢

  • @akankshahinduja7629
    @akankshahinduja7629 Před 3 lety +7

    Hey Abhi, Can u please share the pdf link of your notes?

  • @sahrookhan500
    @sahrookhan500 Před rokem

    MashAllah

  • @khanhusnain2165
    @khanhusnain2165 Před 4 lety +2

    In method 3 should not we use public key for encryption instead of private key?

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +1

      No we are achieving the concept of digital signature here to get authentication.
      So its completely fine!
      Watch digital signature video if u want

  • @lakshsinghania
    @lakshsinghania Před 3 měsíci

    abhishek bhaiya, cant we use hash function tied to cipher text ? just like u explained for MAC ?
    msg -> E with key (cipher text) -> H (h) -> append -> cipher text + h
    ab cipher text ko decrypt with key and hash ko compare kar do

    • @lakshsinghania
      @lakshsinghania Před 3 měsíci

      isme toh dono confidentiality + authentication mil rhe h

  • @SHIVAMGUPTA-fp2uc
    @SHIVAMGUPTA-fp2uc Před 2 lety

    nice

  • @PareeksAcademy10october2001

    Jai shree ram 🙏

  • @23_h_rajatbhatt21
    @23_h_rajatbhatt21 Před 2 lety

    key ka use kyu ho rha hai bhai aaone ne kh thea ki key ka use nhi hog ais kyu

  • @ayyoobhasan7206
    @ayyoobhasan7206 Před 2 lety

    Why use key sir in hash ?

  • @nishikantshirke273
    @nishikantshirke273 Před 4 lety

    Method 4 me using symmetric key..encryption and decryption, Private and public key se kaise kiya...same key honi chahiye thi na..?

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +2

      See hamne encryption and decryption same key se kia h ! So isliae Symmetric key Cryprtography ka concept hogya h
      And jo hamne private key se shuru me hashcode ko Encrypt kia h that is used to achieve the authentication by using the concept of digital signature
      Taki receiver ko pata chal sake ki ha yahi person mujhe msg bhejra h
      That it is coming from a authentic source
      I hope ab clear hogya hoga!
      Nahi clear hua h to watch digital signature video also

    • @nitishsharma7545
      @nitishsharma7545 Před rokem

      @@AbhishekSharmaDit sir kindly provide notes or material of this video 🥺🥺🥺🥺

  • @thecatinamorato838
    @thecatinamorato838 Před 3 lety

    itni sari rulse...konsa parna hoga xam ki liye?

  • @VivekSingh-gy3zn
    @VivekSingh-gy3zn Před rokem

    you said there is no concept of key in hash function to check data integrity but you will used key why so......

  • @RTXAftab
    @RTXAftab Před 2 lety

    Hash function me private key se encryption hoti h ya apse ghalti hogyi h????