NETWORK SECURITY - MD5 ALGORITHM

preview_player
Показать описание
The MD5 algorithm is a widely used hash function producing a 128-bit hash value.
Step 1. Append Padding Bits. The message is "padded" (extended) so that its length (in bits) is congruent to 448, modulo 512. ...
Step 2. Append Length. ...
Step 3. Initialize MD Buffer
Step 4. Process Message in 16-Word Blocks. ...
Step 5. Output.
Рекомендации по теме
Комментарии
Автор

The only good, correct and concise explanation of MD5 on youtube.

bhavukkalra
Автор

Hello sir, I am a student in IIT. You explain far better than my faculty. Thank you so much for the video.

rahulshakya
Автор

This is the most helpful video on the internet about MD5. Well done and thanks!

lloydvasser
Автор

Bruh, you have the gift of explaining things and making them easy, nicely done!

henriquekrever
Автор

Iam ur regular youtube student, i apprucuate for ur great effort and knowledge.

kiransb
Автор

your all videos really helpful sir...its clear and good 👍👍👍👍👍👍👍👍👍👍👍

ambarishkanagarajah
Автор

you literally couldnt tell it better you're the best

superliggolleri
Автор

very nice explanation, Thank you for your in depth presentation about MD5

sajanvethakumar
Автор

Sir kudos to you.Your explanation is Crystal clear.Just one advice try to cut down the video length by avoiding the repetition I Know that repetition makes viewers learn better but some people try to avoid seeing the video just by it's length.I was one of them.After seeing your videos I understood how great your videos are.

reddaboinavivek
Автор

what books can we read to understand all the encryption algorithms deeply?

RahulSalunkheShivaSanskar
Автор

finally got a satisfactory explaination

jaishriharivishnu
Автор

at 21:14, what the the "⌄" symbols stand for?

joshw
Автор

Thank you so much sir for clean & neat explaination of MD5. Sir can you please explain the "Tiger Hash algorithm". This topic is bit confusing to understand.

preethiyr
Автор

what a veryyyy nice explanation! thank you.

georgessader
Автор

Hello Sir, wats s in circular left shift?

srinivasr
Автор

What is plain text? Can you please tell me. And can you please tell me what we will do with 16 32-bit word which was generated in step4 in step5?

shubhiagrawal
Автор

thank you very much! very clear explanation. I wonder for X[k], how to determine which part of the plaintext (k) will be modified? Thank!

sunnymaymeowmeowmeow
Автор

Thank you very much. Very well explanation

malikadabare
Автор

I think, at 18:17, there should be 'B' in left side of formula as you have shown on figure at 28:17.

dhavaldl
Автор

Hello sir im new in network security but i have a question how do you make the 512 bits be stored in the buffers that only have 32 bits each buffer

momog