NETWORK SECURITY - HMAC ALGORITHM

Sdílet
Vložit
  • čas přidán 2. 08. 2024
  • / sundeepsaradhi

Komentáře • 117

  • @maheshb3756
    @maheshb3756 Před 3 lety +10

    Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.

  • @manjitshakya2341
    @manjitshakya2341 Před 4 lety

    Thank you,
    sundeepsaradhi Keep doing what you do

  • @shanthinimarimuthu6674
    @shanthinimarimuthu6674 Před 6 lety +9

    Sir,
    First i need to say ur teaching is superb.. Can u send me the link for CMAC ...

  • @kavanasalanki
    @kavanasalanki Před 5 lety +2

    Seriously it helped me sir.... Thank you so much

  • @shitang8031
    @shitang8031 Před 4 lety +3

    HI sir, many thanks for your video! I would like to ask if i use SHA256 and I will get a 256 bits output. However, if my b bit is smaller than 256, should I pad anything on it? why I cannot just compute the hash function and get 256 bits string as my output?

  • @kavanpuranik98
    @kavanpuranik98 Před 5 lety

    Awesome explanation! Thanks!!

  • @shaikabdulgaffar4438
    @shaikabdulgaffar4438 Před 5 lety

    Thank you so much sir really very useful. Once again thank u😊

  • @ronnelagulto8310
    @ronnelagulto8310 Před 6 lety +2

    YOu are so great explaining this...BRAVO with you sir

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi ronnel
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @salilmanocha9139
    @salilmanocha9139 Před 4 lety

    you are one of the best teachers

  • @syedasurraiyafatima6382
    @syedasurraiyafatima6382 Před 4 lety +1

    Very clear explanation sir. Thank you so much sir.

  • @pallavithakur3395
    @pallavithakur3395 Před 5 lety

    Really a huge thank u sir... u saved 12 marks for me...

  • @youknowwho3377
    @youknowwho3377 Před 4 lety

    Very well explained..... Thank you 😃

  • @maruboyanasumanasri8474
    @maruboyanasumanasri8474 Před měsícem

    Thank you sir, I understood well because of your explanation 👍👍

  • @theguy847
    @theguy847 Před 5 lety

    Thanks a lot sir.You saved my day

  • @HayDay_Heaven
    @HayDay_Heaven Před 3 lety +1

    Thank you so much sir.. neat explanation

  • @ravivarma6046
    @ravivarma6046 Před 3 lety

    Thank you sir ... superb 👌👌 explained

  • @arian7472
    @arian7472 Před 5 lety

    Very Good but always try to clarify how each peer generate the key then shared
    also if you can mirror that to a complete VPN negotiation using IKE v1 and 2 it will be very good
    the key creation and exchange is very important and missing with all who study vpn

  • @anmaraljanabi7137
    @anmaraljanabi7137 Před 4 lety +4

    God bless you

  • @mayurPrmr1182
    @mayurPrmr1182 Před rokem

    Great explanation 😀

  • @praneethcj6544
    @praneethcj6544 Před 6 lety +4

    very well explained sir ...!!! life saviour for exams

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi praneeth
      all the best for your exams
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @hitendusseja6615
    @hitendusseja6615 Před 2 měsíci

    Nice video sir
    Nicely explained

  • @AartiSharma-nj2ic
    @AartiSharma-nj2ic Před 6 lety +1

    Viewed all ur videoes
    Best teaching method n easy
    Thank you

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi sharma
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @rajeshawal772
    @rajeshawal772 Před rokem

    Thank you so much!

  • @abishaa6691
    @abishaa6691 Před 2 lety

    Very nice explanation...thank you sir

  • @ramolashishupal4783
    @ramolashishupal4783 Před 5 lety

    Very helpful videos sir
    Thank u sir

  • @ambicabanchode2581
    @ambicabanchode2581 Před 5 lety

    excellent work sir

  • @Tollmer
    @Tollmer Před 6 lety +4

    The best explanation on youtube. Thanks for sharing your knowledge :-) But one question i have. The value of opad and ipad are constants? And if they are constants, are this constants the same for every hashfunction?

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi
      yes these values are not constants they may vary depending on algorithm.
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @dinnusebastian4615
    @dinnusebastian4615 Před 5 lety

    Is any video on mac (messsage authentication code) is available here..

  • @bellalmahtab8220
    @bellalmahtab8220 Před 3 lety

    Sir how u insert these no to the iPad or opad

  • @SahilSikarwarBIT
    @SahilSikarwarBIT Před 5 lety

    He is speaking the language of gods #saviour #Lord

  • @bhavyaparikh667
    @bhavyaparikh667 Před 3 měsíci

    BEST!!!!!!

  • @nehalsingh785
    @nehalsingh785 Před 2 lety

    awesome tutorial sir

  • @ganeshjaggineni4097
    @ganeshjaggineni4097 Před rokem

    NICE SUPER EXCELLENT MOTIVATED

  • @sakinavetiprathushya5578

    Sir is there any difference in this Hmac algorithm compared to remaining algorithms

  • @jithinkgeorge2237
    @jithinkgeorge2237 Před 5 lety

    awesome!

  • @shivamnandha8075
    @shivamnandha8075 Před 4 lety

    Very useful......

  • @tehreemkhzr8290
    @tehreemkhzr8290 Před 6 lety +1

    A well explained tutorials..keep it up.

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi tehreem
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @zsurdo
    @zsurdo Před 2 lety

    Excellent explanation, but I have a question with the condition (0 < K < b) wich is the value for b, how many bits has b? or how many bits I need to add on the left of k.?

  • @sivabhaskarreddygonapati8824

    i cant understand b/8 with ipad amd opad .Can u tell me about it??

  • @ghufrankhan8458
    @ghufrankhan8458 Před 3 lety

    Thank you for your help sir

  • @Raj_Patel21
    @Raj_Patel21 Před 5 lety

    Very nice explanation

  • @vishavgupta3717
    @vishavgupta3717 Před 5 lety

    Thank You Sir

  • @21day5
    @21day5 Před 2 lety

    nice explanation

  • @banderallogmany1912
    @banderallogmany1912 Před 5 lety +1

    Really thank you, you saved my time.
    In 09:50 you may meant pad to b bits.

  • @sreelekshmianair8870
    @sreelekshmianair8870 Před 6 lety +2

    well explained..thank you sir

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi sreelakshmi
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @siddarthakolani5796
    @siddarthakolani5796 Před 5 lety

    Nice explanation sir
    In this what if K value is equal to B, then there won't be k+?
    Then how we should take k+ value for further process??

    • @zsurdo
      @zsurdo Před 2 lety

      when K=b you have K+. this is the condition. in my case.. my question is how many bits has b.....? to condition will be positive.

  • @jayachandranuthalapati2519

    Thank you sir

  • @rdcreations4u209
    @rdcreations4u209 Před 2 lety

    U r thop😘

  • @divyasimhadri4677
    @divyasimhadri4677 Před 3 lety

    Thank you so much sir

  • @shruthikamalk4915
    @shruthikamalk4915 Před 5 lety

    What does b/8 mean?

  • @rajasreenair6496
    @rajasreenair6496 Před 6 lety +1

    Well explained. Thanks a lot sir

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi rajasree
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @swaroopkv4540
    @swaroopkv4540 Před rokem

    Repeat b by 8 times means?

  • @arian7472
    @arian7472 Před 5 lety

    many thx sir just you said many times that HMAC not use key, but the key has a main role here, can you explain
    i know
    MD5 and SHA is just integrity mechanism
    and
    HMAC is modify of them by adding a key to avoid Man in the middle

  • @rahimanabdul5722
    @rahimanabdul5722 Před 4 měsíci

    Suoer sir

  • @manojbabu7103
    @manojbabu7103 Před 5 lety

    Y b/8 times ?

  • @thakurneelima441
    @thakurneelima441 Před 4 lety

    why we need to repeat ipad and opad fpr b/8times

  • @amudhapi6492
    @amudhapi6492 Před 3 lety

    What is the purpose of hmac ???

  • @sakinavetiprathushya5578

    What is advantage of HMAC sir

  • @Babulal-kq2ib
    @Babulal-kq2ib Před 3 měsíci

    In mac also we used key here also not getting the difference between two.

  • @siddanatibhargav3070
    @siddanatibhargav3070 Před 5 lety

    Y r u don't make videos on idea n cast128 blowfish
    Make videos for these they r useful for us

  • @sreenaunnikrishnan3135
    @sreenaunnikrishnan3135 Před 5 lety +1

    Sir please explain security of HMAC

  • @gummadinagalakshmi4083

    Tq

  • @nithinrupireddy7540
    @nithinrupireddy7540 Před 6 lety +1

    Fantastic

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi Nithin
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

    • @sangeethamanekar2421
      @sangeethamanekar2421 Před 6 lety

      Hw can write ntwrk security in exm

  • @santoshkumarmehra68
    @santoshkumarmehra68 Před 4 lety

    Thanks you sir ji

  • @chethandandi5907
    @chethandandi5907 Před rokem

    Yes...there is god...

  • @besalraj4334
    @besalraj4334 Před 3 lety

    Thankyou Sir _/\_

  • @pawankesharwani7831
    @pawankesharwani7831 Před 5 lety +1

    what is ipad,opad and define how it is use b/8 times.

  • @Girliyapaa-Mostly-Sane

    anybody tell me if k=0011 b=8 what is the value of k+ , si, ipad, opad, s2.

  • @duraivelp879
    @duraivelp879 Před 5 lety

    Can u pls upload the CMAC Algorithm sir

  • @neelimavaddi2218
    @neelimavaddi2218 Před 5 lety

    Sir plzz explain SHA-3.3...please do reply...

  • @sauravkumar-yh7tv
    @sauravkumar-yh7tv Před 6 lety +1

    What is the length of 'b' bits?
    And
    What mean b/8?

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety +1

      hi saurav
      length of b depends on plain text.
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

    • @domenicorodilosso5465
      @domenicorodilosso5465 Před 5 lety +7

      if the length of K+ is for example 128 bits, in order to XOR this value with ipad or opad value, we need K+ and ipad (or opad) of the same size. So we know that the ipad's value is 00110110, so 8 bits, in order to reach the size of K+ (128 bits), we have to repeat this value (00110110) 128/8 = 16 times. At the end of this process K+ and ipad will have the same length and they will can be xored.

    • @pasindusiriwardana5242
      @pasindusiriwardana5242 Před 5 lety

      @@domenicorodilosso5465 nice

  • @jyothijyo6409
    @jyothijyo6409 Před 4 lety

    Sir we need hashing table techniques

  • @kempannamuniyegowda2566
    @kempannamuniyegowda2566 Před 6 lety +1

    hi nice easy to understand
    sir upload video for sha1

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi muniyegowda
      i have uploaded sha-512 and it is one of the variant of sha-1 the only difference is the output hash code.the implementation is same so once go through the video and let me know if you find any difficullty.

  • @kotiprasad5522
    @kotiprasad5522 Před 6 lety +1

    Can you please kindly tell the difference between the authentication algorithms and encryption algorithms with a real time example in simple words?

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety +10

      hi prasad
      Authentication algorithms are meant for verifying the sender and to acheive integrity that mean the receiver should know that the data has not been modified during the transmission.
      Encryption algorithms are meant for providing the security for the data that is converting plain text to cipher text.
      Hope your doubt has been clarified.

    • @a.yashwanth
      @a.yashwanth Před 3 lety +4

      If you receive a post and it's from the president then you will verify the sign to make sure. That is authentication.
      If you send a message to someone using WhatsApp then no one can understand the message other than you 2. That is encryption.

  • @jpmtech4063
    @jpmtech4063 Před 4 lety +3

    Sir, could you please upload a video explaining Time based One Time Passwords (TOTP) and how they are calculated

  • @vibhuthakur5665
    @vibhuthakur5665 Před 5 lety +2

    Sir is there any difference between HMAC algo and efficient implementation of HMAC?

    • @NitishRaj
      @NitishRaj Před 5 lety +3

      Yes. Efficient itself depicts.

  • @nive774
    @nive774 Před 5 lety

    Sir i need CMAC

  • @DrIBLal
    @DrIBLal Před 6 lety +1

    Will you please explain ipad and opad with more clarity

    • @surajdaiya6392
      @surajdaiya6392 Před 5 lety

      Yaa ,can you explain opad and iPad in details with examples

    • @sundeepsaradhi
      @sundeepsaradhi  Před 5 lety

      Hi lal
      These are the predefined values to be used in algorithm.
      Thanks for your support and interest towards our channel and share our channel with your friends. Keep following our channel.

  • @balashivuduu2101
    @balashivuduu2101 Před 6 lety +2

    Sir explain Elliptic curve cryptography algorithm

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi bala
      thanks for your interest towards our channel.
      soon i will try to upload it.

  • @nikhilreddychaganti761

    mac algorithm and hmac algorithm is same are different

  • @swadhindas5853
    @swadhindas5853 Před 5 lety

    sir please upload DSS and ECDSA

  • @kbvrama
    @kbvrama Před 6 lety

    cmac algorithim pleasw

  • @praneethunknown
    @praneethunknown Před 6 lety +1

    Sir, Thank You very much sir.. Miru telugu valla?

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi praneeth
      yes i am from andhra pradesh and thanks for your interest and support towards our channel.

  • @gauravsingh-cd2mg
    @gauravsingh-cd2mg Před 6 lety +1

    plz sir shoot a program of pattern program plz sir

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety

      hi gaurav
      thanks for your interest towards our channel. soon i will upload them.

    • @gauravsingh-cd2mg
      @gauravsingh-cd2mg Před 6 lety +1

      Sundeep Saradhi Thanx sir for replying my msg..
      and i hope that you will full fill your promise

    • @sundeepsaradhi
      @sundeepsaradhi  Před 6 lety +1

      sure gaurav but give me some time.

  • @KANUMURIPAVANKUMARVARMA

    hi

  • @chinthamokshith7887
    @chinthamokshith7887 Před 4 lety +1

    You are a bit slow plz try to improve your speed bro but Content was 👌🏻

  • @vishalthapa518
    @vishalthapa518 Před 5 lety +1

    where is example of it?

  • @atchireddy4299
    @atchireddy4299 Před 2 lety

    i did not understand this concept sir