Authenticating Data with Message Authentication Codes

  Рет қаралды 17,345

Aleksander Essex

Aleksander Essex

3 жыл бұрын

Information Security - Week 5
In this video: Effects of ciphertext modification, the adaptive chosen ciphertext attack game (CCA2), block cipher padding, PKCS #7, padding oracle attacks, message authentication codes (MACs), hash based message authentication codes (HMAC), MAC configurations, encrypt-then-mac, mac-then-encrypt, authenticated encryption, AES-GCM
Undergraduate course on networking security and cryptography taught by Aleksander Essex, Ph.D., P.Eng., Associate professor of Software Engineering, Associate Chair (Graduate), Department of Electrical and Computer Engineering, Western University, Canada
Website:
essex.cc
Twitter:
/ aleksessex
Course topics include:
Confidentiality, authenticity, integrity, ciphers, plaintext, ciphertext, encryption, decryption, keys, key generation function, uniform random, semantic security, bits of security, brute force, Kerckhoff's principle, semantic security, ciphertext indistinguishability, IND-CPA, INC-CCA, block ciphers, message padding, PKCS 7, modes of operation, initialization vector, pseudo-random permutation, counter mode, cipher block chaining, electronic codebook mode, counter mode, CBC, ECB, CTR, Advanced Encryption Standard, AES, hash functions, random oracles, pre-image resistance, collision resistance, SHA-1, SHA-256, SHA3, SHA-513, MD5, message authentication codes, MACs, Galois counter mode, GCM, AEC-GCM, public-key cryptography, Diffie-Hellman, public-key agreement, Elliptic curve Diffie-Hellman, DHE, ECDHE, digital signatures, ECDSA, RSA signatures, PKCS v1.5, digital certificates, X.509, public-key infrastructure, PKI, certificate pinning, certificate revocation, CRL, trust store, Transport Layer Security, TLS, TLS 1.2, TLS 1.3, HTTP over TLS, HTTPS Secure Shell, SSH, ciphersuite, client hello, server hello, VPNs, TOR, 802.11, wifi encryption, client authentication, passwords, password hashing, password lengths, single sign-on, federated identity
----
Music: Arp Bounce - Geographer
Support by RFM - NCM: bit.ly/2xGHypM
Slide template: Slidesgo including Flaticons with infographics & images by Freepik

Пікірлер: 15
@JustSkillGG
@JustSkillGG 3 жыл бұрын
this video DEFINETELY deserves more views. You have done a very good job sir
@jaosberg
@jaosberg 3 жыл бұрын
Fantastic video! Well produced and a great focus on the "why's". This video is a gift to all CS-students.
@valeriewang1473
@valeriewang1473 2 жыл бұрын
I like this reasoning perspective on why should we use this algorithm! this video definitely deserves more viewers
@abreue5127
@abreue5127 2 жыл бұрын
Congratulations! Thank you for the content!
@FreeDomSy-nk9ue
@FreeDomSy-nk9ue 2 жыл бұрын
Awesome stuff. Thank you
@blowingupblocks
@blowingupblocks 2 жыл бұрын
thanks for the wonderful vid!
@citclayton
@citclayton 3 жыл бұрын
this video deserves more views!!
@maksudahossain8482
@maksudahossain8482 3 жыл бұрын
Excellent!
@1UniverseGames
@1UniverseGames 3 жыл бұрын
Is it possible sir to show it in programming perspective like how it implemented. It will be helpful, also a bit of its Mathematical explanation
@yannicklittek3314
@yannicklittek3314 3 жыл бұрын
MAC explanation at 12:35
@raquelbibi1436
@raquelbibi1436 3 жыл бұрын
Please make a video about number two factor authentication (twitter) I got so confused cause give me so many numbers
@lobaandrade3091
@lobaandrade3091 3 жыл бұрын
okay so i was pirating movies and later that day i wanted to look at my grades but then i got an error message while signing in saying an attacker changed something. edit: i just turned on cookies and it works now lol
@gam__04
@gam__04 2 жыл бұрын
this video is so complicated 😧😧
@tsunningwah3471
@tsunningwah3471 2 ай бұрын
弓弓
@tsunningwah3471
@tsunningwah3471 28 күн бұрын
zhina
Securing Stream Ciphers (HMAC) - Computerphile
9:24
Computerphile
Рет қаралды 303 М.
Semantic Security and the One-Time Pad
14:30
Aleksander Essex
Рет қаралды 7 М.
КАРМАНЧИК 2 СЕЗОН 5 СЕРИЯ
27:21
Inter Production
Рет қаралды 278 М.
Conforto para a barriga de grávida 🤔💡
00:10
Polar em português
Рет қаралды 95 МЛН
Тяжелые будни жены
00:46
К-Media
Рет қаралды 4,3 МЛН
Don't eat centipede 🪱😂
00:19
Nadir Sailov
Рет қаралды 22 МЛН
Modes of Operation - Computerphile
14:16
Computerphile
Рет қаралды 216 М.
HMAC explained | keyed hash message authentication code
6:33
Jan Goebel
Рет қаралды 63 М.
What Are AEAD Ciphers?
11:09
F5 DevCentral
Рет қаралды 23 М.
Encrypting with Block Ciphers
21:42
Aleksander Essex
Рет қаралды 35 М.
The Science of Codes: An Intro to Cryptography
8:21
SciShow
Рет қаралды 1,1 МЛН
Elliptic Curves - Computerphile
8:42
Computerphile
Рет қаралды 533 М.
NETWORK SECURITY - TYPES OF AUTHENTICATION (Message Encryption, MAC, Hash Functions)
40:57
Эффект Карбонаро и бумажный телефон
1:01
История одного вокалиста
Рет қаралды 2,4 МЛН
#miniphone
0:18
Miniphone
Рет қаралды 3,3 МЛН
🤖Вернулись в ПРОШЛОЕ🤪
0:28
Demin's Lounge
Рет қаралды 101 М.