Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003

  Рет қаралды 19,163

Satish C J

Satish C J

Күн бұрын

We will be looking at the following concepts in this lecture
1. What are hash functions
2. Properties of a good hash function
3. Application of Hash functions in Cryptography
4. Application of Hash Functions for Message Authentication
5. Application of Hash Functions in Digital Signatures
6. Application of Hash Functions for Password Protection
7. Application of Hash Functions for Virus Detection
8. Security Requirements for Hash Functions in Cryptography

Пікірлер: 22
@shahebealam683
@shahebealam683 Жыл бұрын
This is most tough... Subject no lectures provided in you world.... Waoh amazing
@parathan
@parathan 2 жыл бұрын
You are awesome sir, I can able to get most of the contents related to cryptography which I couldn't understand from my college module. Thanks sir
@SatishCJ
@SatishCJ 2 жыл бұрын
Thanks for the nice feedback
@jitendraanne5989
@jitendraanne5989 2 жыл бұрын
Really a very helpful and nice explanation of Elliptic curve cryptography. The best available. No doubt you are the best professor.
@sagadam.stephen2282
@sagadam.stephen2282 Жыл бұрын
Your lectures are very clear, Great work done. But please group the lectures of a particular subject in one file for easy access.Especially Network Security Lectures. Thanks.
@SatishCJ
@SatishCJ Жыл бұрын
I have created a playlist (cyber security lectures) . Hope it helps. Thanks for the feedback
@omarespino964
@omarespino964 2 жыл бұрын
EXCELLENT lecture! Very clear and precise for such a complex subject. I would love to see a lecture on data structures and algorithms. Professor you have a gift for explaining complex subjects in an easy to understand form. Deeply grateful. Best wishes. Thank you!
@akheelakhanum1521
@akheelakhanum1521 7 ай бұрын
too good professor
@saisurya72
@saisurya72 2 жыл бұрын
Nice explanation sir.... Iam a vit student, found out to be better than my faculty lectures❤
@MDzaman-bg7fn
@MDzaman-bg7fn 7 ай бұрын
try to understand very good lecture thank you so much
@SatishCJ
@SatishCJ 7 ай бұрын
You are most welcome
@peji6000
@peji6000 2 жыл бұрын
Great explanation!!!
@tariqwaseem3941
@tariqwaseem3941 2 жыл бұрын
thank you so much. This is fantastic explanation
@nagarajc7745
@nagarajc7745 3 жыл бұрын
Nice explanation.. I am expecting few more videos on CNS
@abduselamkoc5781
@abduselamkoc5781 Жыл бұрын
satish hocam (it means my teacher) if you are not happy where you are now, we can arrange you something in Turkey. :)
@itsme-zr2pk
@itsme-zr2pk 5 ай бұрын
Sir , i would be greatful if u share the ppts because in my clg they are not providing any notes for us
@shahebealam683
@shahebealam683 Жыл бұрын
Waoh
@MdAhsanHabib-b5q
@MdAhsanHabib-b5q 10 ай бұрын
sir, can i have the lecture slide from any downloadable link plz?
@a7medk7alid7
@a7medk7alid7 Жыл бұрын
Could you kindly provide me with the PowerPoint slides for the cryptography topics at your earliest convenience? I am in great need of these slides and their contents are of utmost importance to my studies.
@bhushanamkommu8875
@bhushanamkommu8875 Жыл бұрын
Hai sir.pls provide me ppt for this concept.
@shahebealam683
@shahebealam683 Жыл бұрын
Shame on iit teacher seeing you sir..
@shahebealam683
@shahebealam683 Жыл бұрын
I never ever
POV: Your kids ask to play the claw machine
00:20
Hungry FAM
Рет қаралды 18 МЛН
Or is Harriet Quinn good? #cosplay#joker #Harriet Quinn
00:20
佐助与鸣人
Рет қаралды 60 МЛН
Шок. Никокадо Авокадо похудел на 110 кг
00:44
OYUNCAK MİKROFON İLE TRAFİK LAMBASINI DEĞİŞTİRDİ 😱
00:17
Melih Taşçı
Рет қаралды 10 МЛН
COMP6441 : Hashes, Preimage and collision resistance
20:04
Adam Smallhorn
Рет қаралды 19 М.
What is a Cryptographic Hashing Function? (Example + Purpose)
7:08
Whiteboard Crypto
Рет қаралды 90 М.
Chapter 11 - Cryptographic Hash Functions
28:21
Hussein Fadl
Рет қаралды 8 М.
AT&T Archives: The UNIX Operating System
27:27
AT&T Tech Channel
Рет қаралды 2 МЛН
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 110 М.
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,6 МЛН
What are Digital Signatures? - Computerphile
10:17
Computerphile
Рет қаралды 334 М.
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 343 М.
POV: Your kids ask to play the claw machine
00:20
Hungry FAM
Рет қаралды 18 МЛН