Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
HI sir, many thanks for your video! I would like to ask if i use SHA256 and I will get a 256 bits output. However, if my b bit is smaller than 256, should I pad anything on it? why I cannot just compute the hash function and get 256 bits string as my output?
hi ronnel thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Very Good but always try to clarify how each peer generate the key then shared also if you can mirror that to a complete VPN negotiation using IKE v1 and 2 it will be very good the key creation and exchange is very important and missing with all who study vpn
hi praneeth all the best for your exams thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi sharma thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
The best explanation on youtube. Thanks for sharing your knowledge :-) But one question i have. The value of opad and ipad are constants? And if they are constants, are this constants the same for every hashfunction?
hi yes these values are not constants they may vary depending on algorithm. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi tehreem thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Excellent explanation, but I have a question with the condition (0 < K < b) wich is the value for b, how many bits has b? or how many bits I need to add on the left of k.?
hi sreelakshmi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi rajasree thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
many thx sir just you said many times that HMAC not use key, but the key has a main role here, can you explain i know MD5 and SHA is just integrity mechanism and HMAC is modify of them by adding a key to avoid Man in the middle
hi Nithin thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi saurav length of b depends on plain text. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
if the length of K+ is for example 128 bits, in order to XOR this value with ipad or opad value, we need K+ and ipad (or opad) of the same size. So we know that the ipad's value is 00110110, so 8 bits, in order to reach the size of K+ (128 bits), we have to repeat this value (00110110) 128/8 = 16 times. At the end of this process K+ and ipad will have the same length and they will can be xored.
hi muniyegowda i have uploaded sha-512 and it is one of the variant of sha-1 the only difference is the output hash code.the implementation is same so once go through the video and let me know if you find any difficullty.
hi prasad Authentication algorithms are meant for verifying the sender and to acheive integrity that mean the receiver should know that the data has not been modified during the transmission. Encryption algorithms are meant for providing the security for the data that is converting plain text to cipher text. Hope your doubt has been clarified.
If you receive a post and it's from the president then you will verify the sign to make sure. That is authentication. If you send a message to someone using WhatsApp then no one can understand the message other than you 2. That is encryption.
Hi lal These are the predefined values to be used in algorithm. Thanks for your support and interest towards our channel and share our channel with your friends. Keep following our channel.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
Thank you,
sundeepsaradhi Keep doing what you do
Sir,
First i need to say ur teaching is superb.. Can u send me the link for CMAC ...
Seriously it helped me sir.... Thank you so much
HI sir, many thanks for your video! I would like to ask if i use SHA256 and I will get a 256 bits output. However, if my b bit is smaller than 256, should I pad anything on it? why I cannot just compute the hash function and get 256 bits string as my output?
Awesome explanation! Thanks!!
Thank you so much sir really very useful. Once again thank u😊
YOu are so great explaining this...BRAVO with you sir
hi ronnel
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
you are one of the best teachers
Very clear explanation sir. Thank you so much sir.
Really a huge thank u sir... u saved 12 marks for me...
Very well explained..... Thank you 😃
Thank you sir, I understood well because of your explanation 👍👍
Thanks a lot sir.You saved my day
Thank you so much sir.. neat explanation
Thank you sir ... superb 👌👌 explained
Very Good but always try to clarify how each peer generate the key then shared
also if you can mirror that to a complete VPN negotiation using IKE v1 and 2 it will be very good
the key creation and exchange is very important and missing with all who study vpn
God bless you
Great explanation 😀
very well explained sir ...!!! life saviour for exams
hi praneeth
all the best for your exams
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Nice video sir
Nicely explained
Viewed all ur videoes
Best teaching method n easy
Thank you
hi sharma
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Thank you so much!
Very nice explanation...thank you sir
Very helpful videos sir
Thank u sir
excellent work sir
The best explanation on youtube. Thanks for sharing your knowledge :-) But one question i have. The value of opad and ipad are constants? And if they are constants, are this constants the same for every hashfunction?
hi
yes these values are not constants they may vary depending on algorithm.
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Is any video on mac (messsage authentication code) is available here..
Sir how u insert these no to the iPad or opad
He is speaking the language of gods #saviour #Lord
BEST!!!!!!
awesome tutorial sir
NICE SUPER EXCELLENT MOTIVATED
Sir is there any difference in this Hmac algorithm compared to remaining algorithms
awesome!
Very useful......
A well explained tutorials..keep it up.
hi tehreem
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Excellent explanation, but I have a question with the condition (0 < K < b) wich is the value for b, how many bits has b? or how many bits I need to add on the left of k.?
i cant understand b/8 with ipad amd opad .Can u tell me about it??
Thank you for your help sir
Very nice explanation
Thank You Sir
nice explanation
Really thank you, you saved my time.
In 09:50 you may meant pad to b bits.
well explained..thank you sir
hi sreelakshmi
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Nice explanation sir
In this what if K value is equal to B, then there won't be k+?
Then how we should take k+ value for further process??
when K=b you have K+. this is the condition. in my case.. my question is how many bits has b.....? to condition will be positive.
Thank you sir
U r thop😘
Thank you so much sir
What does b/8 mean?
Well explained. Thanks a lot sir
hi rajasree
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Repeat b by 8 times means?
many thx sir just you said many times that HMAC not use key, but the key has a main role here, can you explain
i know
MD5 and SHA is just integrity mechanism
and
HMAC is modify of them by adding a key to avoid Man in the middle
Suoer sir
Y b/8 times ?
why we need to repeat ipad and opad fpr b/8times
What is the purpose of hmac ???
What is advantage of HMAC sir
In mac also we used key here also not getting the difference between two.
Y r u don't make videos on idea n cast128 blowfish
Make videos for these they r useful for us
Sir please explain security of HMAC
Tq
Fantastic
hi Nithin
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Hw can write ntwrk security in exm
Thanks you sir ji
Yes...there is god...
Thankyou Sir _/\_
what is ipad,opad and define how it is use b/8 times.
you can find the answer below . See Domenico's answer
anybody tell me if k=0011 b=8 what is the value of k+ , si, ipad, opad, s2.
Can u pls upload the CMAC Algorithm sir
Sir plzz explain SHA-3.3...please do reply...
What is the length of 'b' bits?
And
What mean b/8?
hi saurav
length of b depends on plain text.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
if the length of K+ is for example 128 bits, in order to XOR this value with ipad or opad value, we need K+ and ipad (or opad) of the same size. So we know that the ipad's value is 00110110, so 8 bits, in order to reach the size of K+ (128 bits), we have to repeat this value (00110110) 128/8 = 16 times. At the end of this process K+ and ipad will have the same length and they will can be xored.
@@domenicorodilosso5465 nice
Sir we need hashing table techniques
hi nice easy to understand
sir upload video for sha1
hi muniyegowda
i have uploaded sha-512 and it is one of the variant of sha-1 the only difference is the output hash code.the implementation is same so once go through the video and let me know if you find any difficullty.
Can you please kindly tell the difference between the authentication algorithms and encryption algorithms with a real time example in simple words?
hi prasad
Authentication algorithms are meant for verifying the sender and to acheive integrity that mean the receiver should know that the data has not been modified during the transmission.
Encryption algorithms are meant for providing the security for the data that is converting plain text to cipher text.
Hope your doubt has been clarified.
If you receive a post and it's from the president then you will verify the sign to make sure. That is authentication.
If you send a message to someone using WhatsApp then no one can understand the message other than you 2. That is encryption.
Sir, could you please upload a video explaining Time based One Time Passwords (TOTP) and how they are calculated
Sir is there any difference between HMAC algo and efficient implementation of HMAC?
Yes. Efficient itself depicts.
Sir i need CMAC
Will you please explain ipad and opad with more clarity
Yaa ,can you explain opad and iPad in details with examples
Hi lal
These are the predefined values to be used in algorithm.
Thanks for your support and interest towards our channel and share our channel with your friends. Keep following our channel.
Sir explain Elliptic curve cryptography algorithm
hi bala
thanks for your interest towards our channel.
soon i will try to upload it.
mac algorithm and hmac algorithm is same are different
sir please upload DSS and ECDSA
cmac algorithim pleasw
Sir, Thank You very much sir.. Miru telugu valla?
hi praneeth
yes i am from andhra pradesh and thanks for your interest and support towards our channel.
plz sir shoot a program of pattern program plz sir
hi gaurav
thanks for your interest towards our channel. soon i will upload them.
Sundeep Saradhi Thanx sir for replying my msg..
and i hope that you will full fill your promise
sure gaurav but give me some time.
hi
You are a bit slow plz try to improve your speed bro but Content was 👌🏻
🤣🤣 bro? Really?
😏
where is example of it?
i did not understand this concept sir