NETWORK SECURITY - HMAC ALGORITHM

Поделиться
HTML-код
  • Опубликовано: 6 сен 2024

Комментарии • 113

  • @maheshb3756
    @maheshb3756 3 года назад +10

    Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.

  • @shanthinimarimuthu6674
    @shanthinimarimuthu6674 6 лет назад +9

    Sir,
    First i need to say ur teaching is superb.. Can u send me the link for CMAC ...

  • @maruboyanasumanasri8474
    @maruboyanasumanasri8474 2 месяца назад

    Thank you sir, I understood well because of your explanation 👍👍

  • @ronnelagulto8310
    @ronnelagulto8310 6 лет назад +2

    YOu are so great explaining this...BRAVO with you sir

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi ronnel
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @zsurdo
    @zsurdo 2 года назад

    Excellent explanation, but I have a question with the condition (0 < K < b) wich is the value for b, how many bits has b? or how many bits I need to add on the left of k.?

  • @anmaraljanabi7137
    @anmaraljanabi7137 4 года назад +4

    God bless you

  • @praneethcj6544
    @praneethcj6544 6 лет назад +4

    very well explained sir ...!!! life saviour for exams

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi praneeth
      all the best for your exams
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @syedasurraiyafatima6382
    @syedasurraiyafatima6382 4 года назад +1

    Very clear explanation sir. Thank you so much sir.

  • @shitang8031
    @shitang8031 4 года назад +3

    HI sir, many thanks for your video! I would like to ask if i use SHA256 and I will get a 256 bits output. However, if my b bit is smaller than 256, should I pad anything on it? why I cannot just compute the hash function and get 256 bits string as my output?

  • @HayDay_Heaven
    @HayDay_Heaven 4 года назад +1

    Thank you so much sir.. neat explanation

  • @kavanasalanki
    @kavanasalanki 5 лет назад +2

    Seriously it helped me sir.... Thank you so much

  • @Tollmer
    @Tollmer 6 лет назад +4

    The best explanation on youtube. Thanks for sharing your knowledge :-) But one question i have. The value of opad and ipad are constants? And if they are constants, are this constants the same for every hashfunction?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi
      yes these values are not constants they may vary depending on algorithm.
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @hitendusseja6615
    @hitendusseja6615 3 месяца назад

    Nice video sir
    Nicely explained

  • @AartiSharma-nj2ic
    @AartiSharma-nj2ic 6 лет назад +1

    Viewed all ur videoes
    Best teaching method n easy
    Thank you

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi sharma
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @manjitshakya2341
    @manjitshakya2341 4 года назад

    Thank you,
    sundeepsaradhi Keep doing what you do

  • @Babulal-kq2ib
    @Babulal-kq2ib 4 месяца назад

    In mac also we used key here also not getting the difference between two.

  • @salilmanocha9139
    @salilmanocha9139 4 года назад

    you are one of the best teachers

  • @ravivarma6046
    @ravivarma6046 3 года назад

    Thank you sir ... superb 👌👌 explained

  • @abishaa6691
    @abishaa6691 2 года назад

    Very nice explanation...thank you sir

  • @ganeshjaggineni4097
    @ganeshjaggineni4097 Год назад

    NICE SUPER EXCELLENT MOTIVATED

  • @arian7472
    @arian7472 5 лет назад

    many thx sir just you said many times that HMAC not use key, but the key has a main role here, can you explain
    i know
    MD5 and SHA is just integrity mechanism
    and
    HMAC is modify of them by adding a key to avoid Man in the middle

  • @SahilSikarwarBIT
    @SahilSikarwarBIT 5 лет назад

    He is speaking the language of gods #saviour #Lord

  • @youknowwho3377
    @youknowwho3377 4 года назад

    Very well explained..... Thank you 😃

  • @rajeshawal772
    @rajeshawal772 Год назад

    Thank you so much!

  • @pallavithakur3395
    @pallavithakur3395 5 лет назад

    Really a huge thank u sir... u saved 12 marks for me...

  • @shaikabdulgaffar4438
    @shaikabdulgaffar4438 5 лет назад

    Thank you so much sir really very useful. Once again thank u😊

  • @sreelekshmianair8870
    @sreelekshmianair8870 6 лет назад +2

    well explained..thank you sir

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi sreelakshmi
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @tehreemkhzr8290
    @tehreemkhzr8290 6 лет назад +1

    A well explained tutorials..keep it up.

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi tehreem
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @mayurPrmr1182
    @mayurPrmr1182 Год назад

    Great explanation 😀

  • @sreenaunnikrishnan3135
    @sreenaunnikrishnan3135 5 лет назад +1

    Sir please explain security of HMAC

  • @kavanpuranik98
    @kavanpuranik98 5 лет назад

    Awesome explanation! Thanks!!

  • @nehalsingh785
    @nehalsingh785 2 года назад

    awesome tutorial sir

  • @bhavyaparikh667
    @bhavyaparikh667 4 месяца назад

    BEST!!!!!!

  • @theguy847
    @theguy847 5 лет назад

    Thanks a lot sir.You saved my day

  • @kotiprasad5522
    @kotiprasad5522 6 лет назад +1

    Can you please kindly tell the difference between the authentication algorithms and encryption algorithms with a real time example in simple words?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +10

      hi prasad
      Authentication algorithms are meant for verifying the sender and to acheive integrity that mean the receiver should know that the data has not been modified during the transmission.
      Encryption algorithms are meant for providing the security for the data that is converting plain text to cipher text.
      Hope your doubt has been clarified.

    • @a.yashwanth
      @a.yashwanth 3 года назад +4

      If you receive a post and it's from the president then you will verify the sign to make sure. That is authentication.
      If you send a message to someone using WhatsApp then no one can understand the message other than you 2. That is encryption.

  • @pawankesharwani7831
    @pawankesharwani7831 5 лет назад +1

    what is ipad,opad and define how it is use b/8 times.

  • @arian7472
    @arian7472 5 лет назад

    Very Good but always try to clarify how each peer generate the key then shared
    also if you can mirror that to a complete VPN negotiation using IKE v1 and 2 it will be very good
    the key creation and exchange is very important and missing with all who study vpn

  • @rahimanabdul5722
    @rahimanabdul5722 6 месяцев назад

    Suoer sir

  • @21day5
    @21day5 2 года назад

    nice explanation

  • @siddarthakolani5796
    @siddarthakolani5796 5 лет назад

    Nice explanation sir
    In this what if K value is equal to B, then there won't be k+?
    Then how we should take k+ value for further process??

    • @zsurdo
      @zsurdo 2 года назад

      when K=b you have K+. this is the condition. in my case.. my question is how many bits has b.....? to condition will be positive.

  • @sakinavetiprathushya5578
    @sakinavetiprathushya5578 4 года назад

    Sir is there any difference in this Hmac algorithm compared to remaining algorithms

  • @ambicabanchode2581
    @ambicabanchode2581 5 лет назад

    excellent work sir

  • @swaroopkv4540
    @swaroopkv4540 2 года назад

    Repeat b by 8 times means?

  • @ramolashishupal4783
    @ramolashishupal4783 5 лет назад

    Very helpful videos sir
    Thank u sir

  • @ghufrankhan8458
    @ghufrankhan8458 3 года назад

    Thank you for your help sir

  • @vibhuthakur5665
    @vibhuthakur5665 5 лет назад +2

    Sir is there any difference between HMAC algo and efficient implementation of HMAC?

    • @NitishRaj
      @NitishRaj 5 лет назад +3

      Yes. Efficient itself depicts.

  • @jpmtech4063
    @jpmtech4063 4 года назад +3

    Sir, could you please upload a video explaining Time based One Time Passwords (TOTP) and how they are calculated

  • @shivamnandha8075
    @shivamnandha8075 4 года назад

    Very useful......

  • @thakurneelima441
    @thakurneelima441 4 года назад

    why we need to repeat ipad and opad fpr b/8times

  • @Girliyapaa-Mostly-Sane
    @Girliyapaa-Mostly-Sane 3 года назад

    anybody tell me if k=0011 b=8 what is the value of k+ , si, ipad, opad, s2.

  • @chethandandi5907
    @chethandandi5907 Год назад

    Yes...there is god...

  • @Raj_Patel21
    @Raj_Patel21 6 лет назад

    Very nice explanation

  • @sakinavetiprathushya5578
    @sakinavetiprathushya5578 4 года назад

    What is advantage of HMAC sir

  • @amudhapi6492
    @amudhapi6492 4 года назад

    What is the purpose of hmac ???

  • @nithinrupireddy7540
    @nithinrupireddy7540 6 лет назад +1

    Fantastic

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi Nithin
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

    • @sangeethamanekar2421
      @sangeethamanekar2421 6 лет назад

      Hw can write ntwrk security in exm

  • @bellalmahtab8220
    @bellalmahtab8220 3 года назад

    Sir how u insert these no to the iPad or opad

  • @DrIBLal
    @DrIBLal 6 лет назад +1

    Will you please explain ipad and opad with more clarity

    • @surajdaiya6392
      @surajdaiya6392 5 лет назад

      Yaa ,can you explain opad and iPad in details with examples

    • @sundeepsaradhi
      @sundeepsaradhi  5 лет назад

      Hi lal
      These are the predefined values to be used in algorithm.
      Thanks for your support and interest towards our channel and share our channel with your friends. Keep following our channel.

  • @balashivuduu2101
    @balashivuduu2101 6 лет назад +2

    Sir explain Elliptic curve cryptography algorithm

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi bala
      thanks for your interest towards our channel.
      soon i will try to upload it.

  • @sauravkumar-yh7tv
    @sauravkumar-yh7tv 6 лет назад +1

    What is the length of 'b' bits?
    And
    What mean b/8?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +1

      hi saurav
      length of b depends on plain text.
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

    • @domenicorodilosso5465
      @domenicorodilosso5465 6 лет назад +7

      if the length of K+ is for example 128 bits, in order to XOR this value with ipad or opad value, we need K+ and ipad (or opad) of the same size. So we know that the ipad's value is 00110110, so 8 bits, in order to reach the size of K+ (128 bits), we have to repeat this value (00110110) 128/8 = 16 times. At the end of this process K+ and ipad will have the same length and they will can be xored.

    • @pasindusiriwardana5242
      @pasindusiriwardana5242 5 лет назад

      @@domenicorodilosso5465 nice

  • @banderallogmany1912
    @banderallogmany1912 5 лет назад +1

    Really thank you, you saved my time.
    In 09:50 you may meant pad to b bits.

  • @vishalthapa518
    @vishalthapa518 5 лет назад +1

    where is example of it?

  • @dinnusebastian4615
    @dinnusebastian4615 5 лет назад

    Is any video on mac (messsage authentication code) is available here..

  • @divyasimhadri4677
    @divyasimhadri4677 3 года назад

    Thank you so much sir

  • @sivabhaskarreddygonapati8824
    @sivabhaskarreddygonapati8824 5 лет назад

    i cant understand b/8 with ipad amd opad .Can u tell me about it??

  • @siddanatibhargav3070
    @siddanatibhargav3070 5 лет назад

    Y r u don't make videos on idea n cast128 blowfish
    Make videos for these they r useful for us

  • @santoshkumarmehra68
    @santoshkumarmehra68 4 года назад

    Thanks you sir ji

  • @rajasreenair6496
    @rajasreenair6496 6 лет назад +1

    Well explained. Thanks a lot sir

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi rajasree
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @shruthikamalk4915
    @shruthikamalk4915 6 лет назад

    What does b/8 mean?

  • @rdcreations4u209
    @rdcreations4u209 2 года назад

    U r thop😘

  • @jithinkgeorge2237
    @jithinkgeorge2237 5 лет назад

    awesome!

  • @neelimavaddi2218
    @neelimavaddi2218 5 лет назад

    Sir plzz explain SHA-3.3...please do reply...

  • @nikhilreddychaganti761
    @nikhilreddychaganti761 4 года назад

    mac algorithm and hmac algorithm is same are different

  • @vishavgupta3717
    @vishavgupta3717 5 лет назад

    Thank You Sir

  • @duraivelp879
    @duraivelp879 5 лет назад

    Can u pls upload the CMAC Algorithm sir

  • @kempannamuniyegowda2566
    @kempannamuniyegowda2566 6 лет назад +1

    hi nice easy to understand
    sir upload video for sha1

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi muniyegowda
      i have uploaded sha-512 and it is one of the variant of sha-1 the only difference is the output hash code.the implementation is same so once go through the video and let me know if you find any difficullty.

  • @manojbabu7103
    @manojbabu7103 5 лет назад

    Y b/8 times ?

  • @jyothijyo6409
    @jyothijyo6409 4 года назад

    Sir we need hashing table techniques

  • @besalraj4334
    @besalraj4334 3 года назад

    Thankyou Sir _/\_

  • @gummadinagalakshmi4083
    @gummadinagalakshmi4083 6 лет назад

    Tq

  • @nive774
    @nive774 5 лет назад

    Sir i need CMAC

  • @swadhindas5853
    @swadhindas5853 5 лет назад

    sir please upload DSS and ECDSA

  • @praneethunknown
    @praneethunknown 6 лет назад +1

    Sir, Thank You very much sir.. Miru telugu valla?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi praneeth
      yes i am from andhra pradesh and thanks for your interest and support towards our channel.

  • @KANUMURIPAVANKUMARVARMA
    @KANUMURIPAVANKUMARVARMA 2 года назад

    hi

  • @kbvrama
    @kbvrama 6 лет назад

    cmac algorithim pleasw

  • @atchireddy4299
    @atchireddy4299 2 года назад

    i did not understand this concept sir

  • @chinthamokshith7887
    @chinthamokshith7887 4 года назад +1

    You are a bit slow plz try to improve your speed bro but Content was 👌🏻

  • @jayachandranuthalapati2519
    @jayachandranuthalapati2519 5 лет назад

    Thank you sir