Hash Functions in Cryptography
Vložit
- čas přidán 5. 12. 2019
- #HashFunctions #Cryptography #NetworkSecurity #HashFunction #CryptographyAndNetworkSecurity
message authentication
• Authentication functio...
MAC
• MAC in Cryptography ||...
hash function in Cryptography and network security
200 like krwa deta hun soch k like karne aya fir dekha bhai bahut aage nikal gya hai 😂😂😂😂
Us bhai us😂
Ab to lgta h kuch din me is comment p 200 like aa jayenge
@@TechLa-69 yahi bolne ja ra tha dekha ye koi pehle hi bol chuka hai
😂😂😂😂😂😂🗿🗿🗿🗿🗿🗿
You break down things beautifully! Thank you!
Bhai ajj abhi 4baje exam h and mujhe sab concept samjh mein aa raha h... thank you so much...but my bad mujhe pehle kyun nhi apka vdo Mila ...I can not complete all your videos because only 1hr left ...so thank you so much jitna bhi hua😊
Mind blowing Sir , You don't know but This is the Bestest Video In CZcams To Understand Hash Function ❤❤❤
You perfectly know how to explain 👌👍👍👍👍👍👍👍👍keep up the good work , explanation was great
One of the best video on hash functions
Just need your notes bro 🥺. Amazing teaching !!!
Thank you so much, sir ....... I cleared 7 sem university exam subject which is Cryptography and network security.... your videos and your knowledge are helpful to me ....
you are the best tutor of information security on you tube
your voice is so sweet. I hear every words and understand everything. thank you! :)
Hiiii
Thank you, your notes really helped me for preparation
❤️ UR VIDEOS ARE JUST INCREDIBLE THNX IT HELPED ME FOR MY MCQ XAMS👍
Great help before exams :) whole hearted Thanks!!
Really aap toh bhot acche se samjhate ho really ☺️😊 thanks for This video
Great explanation! Thank you so much! It helps a lot!
Great explanation! Thank you so much! It helps a lot
Thanks a lot bhiya for your all hardwork and efforts..🎊🙏💐
Simple as that, thank you
I have 1 doubt. Authentication by the public key of A and Integrity by hash is the same or not, is it true?
Thank you my man!!
Thanks ❤️ well explained
You just saved my exam ❤️
amazing teaching brother
How can we use hash function to design a secure login to prevent eavesdropping?
Really good explanation 🙌
you nailed it bro
Thanks sir ❤for this...❤❤i watched the full series..
Thanks a lot sir ❤❤❤❤❤❤❤
Thank you brother for this vedio from Nepal
Amazing explanation sir
Watch it 2x you will hear munna bhaiya voice from Mirzapur believe me. btw great work.
Which books i can mention as refrece for this description??
Simple si cheej ko aur complex kar diya bhai tuney
when blue color pen u use for making notes?
thank you bhaiyaa.... have a great day
Thanks sir 🙏❤
thank u sir and happy teachers day
Best explaining
like ka aim rakhte hai 200 likes gets 140k views and 4.5k likes.. you deserve more though :D
Thank you brother
very helpful
Thankyou
Thank you..
love your video all the way from london (
How we find coefficient of Secure hash algorithm??? Or how we crack Secure hash algorithm????
These two questions. Please answer???
thank you
Inme say kis method. Ko paper me likh kay au ..? Mera 8 jan ko. Paper hai please help
Very nice explanation bro👍👍....but yr ek tiger hash or gear hash pe video bnaa do plz..syllabus me mention hai kuk ke
16:21 hmne attacker ko jhand kr diya😂
Thank you
Can you pls make a playlist for distributed systems? You teach amazing
bro need more videos on cryptography
love form nepal
JAZAK ALLAH sir
Nicee tysm ❤️😎
Thank you so much sir
16:20 Hamne apne attacker ko ek tarah se jhand kardiya😂😂
Superbb🤟🤟
What amazing 🙂🙂🙂🙂
Rana Ahsaanullah
Very good
Thanku so much
why did u use private key to encrypt the hash value ....as we should use public key to encrypt the msg or hash value ......plz explain
U can use both private key and public key for encryption ..
Waah kya soch hai re teri
Today is my major exam and I am watching this now
Mene sha algorithm search kiya ha ye video nikli ha please koi guide krdy ye wahi ha ya nai?
Ab to 3 mahiny ho gy guide kru ya na kru😅
you are doing great job man! Respect++
Can u explain the properties of hash function?
Superb
Sir your video is very very helpful , can you please provide the handwritten notes that you explain in your video.
These are the types of hash functions ??
U said key does not use in hash function at 1.11 but u explained with the help of key for encryption and decryption, how it is ??
Hash function me koi key nahi use hui h
Key is only used after hame apna hashcode mil gyaa h after passing the msg throught the hash function
And
Ya to ham key encryption algo me use karre h to encrypt our msg
I hope now samajh me agya hoga
✌️💯
very good sir i clear all concept of cryptography
why we need to write 5...6 methods for hash function? can we define two method in exam?
You are so good but explanation is fast make it slightly slow
Bro kerberos ki video nhi mil rhi..! Did you made any video on that?
I play your vids whenever my nephews and nieces come over and watch annoying tiktoks over and over and over......they met there match......
mason chips ohh sorry crisp maybe you should also start doing tiktok by this you will not do this shit talk here in comments ;
@abhishek bhai notes ki pdf link send krdo..
Great explaination
Nice
Bhai ek lucky jet game hai uska sha 512 algorithm use hota hai usko kaise follow kare jaise
Masta✌️
❤
Bhaiya ap ek heap sort algorithm ke upar video bna dijiyena pls.. 13 ko exam hai mera
Bro please video on DSS approach
pls repky i m very confused what are types of hash function ?????
I wish if my course teacher saw this video
thank you bro.. great work and teri notes ki pdf send karna link mai...
aWESOME
Its too good but hashing mein to key use nahi karte h na ?
❤❤
just wow
bro i neeed answer of this question:- hashing is useful tool in
(a)prevention of unauthorized file modification
(b)the development of secure cryptography algorithm
both
Any one method can write or all the methods should write 😢
Hey Abhi, Can u please share the pdf link of your notes?
+1
MashAllah
In method 3 should not we use public key for encryption instead of private key?
No we are achieving the concept of digital signature here to get authentication.
So its completely fine!
Watch digital signature video if u want
abhishek bhaiya, cant we use hash function tied to cipher text ? just like u explained for MAC ?
msg -> E with key (cipher text) -> H (h) -> append -> cipher text + h
ab cipher text ko decrypt with key and hash ko compare kar do
isme toh dono confidentiality + authentication mil rhe h
nice
Jai shree ram 🙏
key ka use kyu ho rha hai bhai aaone ne kh thea ki key ka use nhi hog ais kyu
Why use key sir in hash ?
Method 4 me using symmetric key..encryption and decryption, Private and public key se kaise kiya...same key honi chahiye thi na..?
See hamne encryption and decryption same key se kia h ! So isliae Symmetric key Cryprtography ka concept hogya h
And jo hamne private key se shuru me hashcode ko Encrypt kia h that is used to achieve the authentication by using the concept of digital signature
Taki receiver ko pata chal sake ki ha yahi person mujhe msg bhejra h
That it is coming from a authentic source
I hope ab clear hogya hoga!
Nahi clear hua h to watch digital signature video also
@@AbhishekSharmaDit sir kindly provide notes or material of this video 🥺🥺🥺🥺
itni sari rulse...konsa parna hoga xam ki liye?
you said there is no concept of key in hash function to check data integrity but you will used key why so......
Hash function me private key se encryption hoti h ya apse ghalti hogyi h????