MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

preview_player
Показать описание
In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough, which leads us into the definition of a MAC. Then we define the most commonly used MAC... the HMAC.

// CHAPTERS //

0:00 - Message Authentication Codes
0:38 - Hashing isn't enough for Integrity
2:04 - Hashing vs Encryption (two different problems)
2:37 - MAC Simply Explained
3:58 - MACs vs HMACs
5:38 - MAC Algorithms
5:57 - MACs can be included with Encryption in AEAD Ciphers

// FULL SERIES - Cryptography Essentials //

This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply, and technically accurate.

The full series is available here:

00 Series Introduction
01 Hashing
02 Keys / Secret Keys
03 Symmetric Cryptography
04 Encryption
05 MAC / HMAC
06 Pseudo Random Function
07 Asymmetric Cryptography
08 Asymmetric Encryption (RSA)
09 Signatures
10 RSA Signatures
11 DSA Signatures
12 Key Exchanges
13 RSA Key Exchanges
14 DH Key Exchanges
15 Elliptic Curve Cryptography

// SUPPORT PRACTICAL NETWORKING //

If this content benefited you, then here are TOTALLY FREE ways to show your appreciation:

- 👍 Like to help this video reach more viewers
- 💬 Comment to boost the channel's visibility
- 🔔 Subscribe to help me attract sponsors (this is the number they care about)
Рекомендации по теме
Комментарии
Автор

👉 *Shortlink* pracnet.net/ce _(this one is easier to share... wink wink)_
🔐 *SSL/TLS Deep Dive course* pracnet.net/tls

PracticalNetworking
Автор

Learning gets interesting when we have instructors like you. Thank you very much sir 🎉❤.

itenthusiast
Автор

You understand where people might be confused at and then you clear that confusion. Thanks so much for your clear explanations.

peteryan
Автор

this detailed content is rare on youtube, thank you bro. I needed this type of content

AissaDev
Автор

Me too.
I bought on the last day and do not regret it at all!
Awesome content and great explanation to make anyone able to understand it.
Thanks a million.

henriquealexandreh
Автор

Thanks for the content.... really like the playlists and all the vids... learned a lot

tari
Автор

Hi, Thank you, learned lot of knowledge with your video buddy, wait more to come 😉

skynet.yousha
Автор

this was really helpful thank you <3

JillMarley-nl
Автор

60 bucks the TLS course? Ill take it!!!

julinop
Автор

Hey Ed. Can you share some love to the practical networking course as well. Feels like you have been busy with Cryptography. We miss you there as well 🙃😁

SaiNengg
Автор

Amazing video, amazing content on this channel, amazing TLS course, can't wait to see the Networking course.
Do you plan to design a comprehensive course about Cryptography?

Thank you.

marius-mihailionte
Автор

Well, this is correct only if the end user doesn't know the original digest. If I publish the original digest, the end users can then compare the digest, and that way, find out if the file/message has been corrupted.

MegaBelgianBlue