Please Login To Continue

Lesson 8- Uses of MAC and Limitations

Lesson 9 of 13 • 0 upvotes • 11:29mins

Avatar

Tripti Tanvi

Scenarios where MAC can be used along with two major limitations of MAC explained in a simple manner.

Continue on app
1

Authentication Protocol - Overview

5:38mins

2

Lesson 1- Message Authentication Requirement

13:21mins

3

Lesson 2- Message Authentication Functions

11:57mins

4

Lesson 3 - Hash Function (Part 1)

10:02mins

5

Lesson 4 - Hash Function (Part 2)

11:06mins

6

Lesson 5 - Applications of Hash Functions

12:15mins

7

Lesson 6 - Requirements and Security of Hash Function

11:27mins

8

Lesson 7- Public Key Encryption and MAC

10:24mins

9

Lesson 8- Uses of MAC and Limitations

11:29mins

10

Lesson 9- Requirements and Security of MAC

9:59mins

11

Lesson 10- HMAC

11:05mins

12

Lesson 11- Digital Signature ( Part 1 )

9:38mins

13

Lesson 12- Digital Signature ( Part 2 )

12:23mins

Crack GATE - Iconic Pro with Unacademy

Get subscription and access unlimited live and recorded courses from India's best educators
Structured syllabus
Structured syllabus
Daily live classes
Daily live classes
Ask doubts
Ask doubts
Tests & practice
Tests & practice

Similar Plus Courses

thumbnail
ENROLL
HinglishDisaster Management

Complete Course on Disaster Management - UPSC CSE - GS

Sumit Konde

Unacademy is India’s largest online learning platform. Download our apps to start learning


Starting your preparation?

Call us and we will answer all your questions about learning on Unacademy

Call +91 8585858585
Company
About usShikshodayaCareersBlogsPrivacy PolicyTerms and Conditions
Products
Learner appLearner appEducator appEducator appParent appParent app