Really nice video. In HMAC, why do you need to hash both the key and the message? I thought about it and if you just hashed the key, then you can't verify the integrity of the message, and if you just hashed the message, you don't know if the message came from Alice. Is that correct? What if someone had the key in this symmetric algorithm? then they could still send a message hashing both their message and the key and the recipient wouldn't really know who it came from because this hacker had the same key and the recipient wouldn't know what the sender wanted to send originally.
plz do not stop uploading videos.
Thanks for this great series. All videos illustrate the basic very well. Help me a lot for my cybersecurity class.
Which cyber security class do you join? And do you get a job after completing it ?
superb! concise & fluent. thank you.
good course, this is a rare course in youtube
Great Content!!!!!
good content
Very informative ! Thank you very much ! :)
Thank you for this course!
great
Really nice video. In HMAC, why do you need to hash both the key and the message? I thought about it and if you just hashed the key, then you can't verify the integrity of the message, and if you just hashed the message, you don't know if the message came from Alice. Is that correct? What if someone had the key in this symmetric algorithm? then they could still send a message hashing both their message and the key and the recipient wouldn't really know who it came from because this hacker had the same key and the recipient wouldn't know what the sender wanted to send originally.
i guess pgp can be code for strings but for files i guess RSA,AES are the best for files(correct me if am wrong)
❤