Lesson 7 of 13 • 0 upvotes • 11:27mins
Security of Hash Function, the brute force attacks done and cryptanalysis of the system.
13 lessons • 2h 20m
Authentication Protocol - Overview
5:38mins
Lesson 1- Message Authentication Requirement
13:21mins
Lesson 2- Message Authentication Functions
11:57mins
Lesson 3 - Hash Function (Part 1)
10:02mins
Lesson 4 - Hash Function (Part 2)
11:06mins
Lesson 5 - Applications of Hash Functions
12:15mins
Lesson 6 - Requirements and Security of Hash Function
11:27mins
Lesson 7- Public Key Encryption and MAC
10:24mins
Lesson 8- Uses of MAC and Limitations
11:29mins
Lesson 9- Requirements and Security of MAC
9:59mins
Lesson 10- HMAC
11:05mins
Lesson 11- Digital Signature ( Part 1 )
9:38mins
Lesson 12- Digital Signature ( Part 2 )
12:23mins