Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003

  Рет қаралды 19,163

Satish C J

Satish C J

Күн бұрын

We will be looking at the following concepts in this lecture
1. What are hash functions
2. Properties of a good hash function
3. Application of Hash functions in Cryptography
4. Application of Hash Functions for Message Authentication
5. Application of Hash Functions in Digital Signatures
6. Application of Hash Functions for Password Protection
7. Application of Hash Functions for Virus Detection
8. Security Requirements for Hash Functions in Cryptography

Пікірлер: 22
@shahebealam683
@shahebealam683 Жыл бұрын
This is most tough... Subject no lectures provided in you world.... Waoh amazing
@parathan
@parathan 2 жыл бұрын
You are awesome sir, I can able to get most of the contents related to cryptography which I couldn't understand from my college module. Thanks sir
@SatishCJ
@SatishCJ 2 жыл бұрын
Thanks for the nice feedback
@jitendraanne5989
@jitendraanne5989 2 жыл бұрын
Really a very helpful and nice explanation of Elliptic curve cryptography. The best available. No doubt you are the best professor.
@sagadam.stephen2282
@sagadam.stephen2282 Жыл бұрын
Your lectures are very clear, Great work done. But please group the lectures of a particular subject in one file for easy access.Especially Network Security Lectures. Thanks.
@SatishCJ
@SatishCJ Жыл бұрын
I have created a playlist (cyber security lectures) . Hope it helps. Thanks for the feedback
@omarespino964
@omarespino964 2 жыл бұрын
EXCELLENT lecture! Very clear and precise for such a complex subject. I would love to see a lecture on data structures and algorithms. Professor you have a gift for explaining complex subjects in an easy to understand form. Deeply grateful. Best wishes. Thank you!
@akheelakhanum1521
@akheelakhanum1521 7 ай бұрын
too good professor
@saisurya72
@saisurya72 2 жыл бұрын
Nice explanation sir.... Iam a vit student, found out to be better than my faculty lectures❤
@MDzaman-bg7fn
@MDzaman-bg7fn 7 ай бұрын
try to understand very good lecture thank you so much
@SatishCJ
@SatishCJ 7 ай бұрын
You are most welcome
@peji6000
@peji6000 2 жыл бұрын
Great explanation!!!
@tariqwaseem3941
@tariqwaseem3941 2 жыл бұрын
thank you so much. This is fantastic explanation
@nagarajc7745
@nagarajc7745 3 жыл бұрын
Nice explanation.. I am expecting few more videos on CNS
@abduselamkoc5781
@abduselamkoc5781 Жыл бұрын
satish hocam (it means my teacher) if you are not happy where you are now, we can arrange you something in Turkey. :)
@itsme-zr2pk
@itsme-zr2pk 5 ай бұрын
Sir , i would be greatful if u share the ppts because in my clg they are not providing any notes for us
@shahebealam683
@shahebealam683 Жыл бұрын
Waoh
@MdAhsanHabib-b5q
@MdAhsanHabib-b5q 10 ай бұрын
sir, can i have the lecture slide from any downloadable link plz?
@a7medk7alid7
@a7medk7alid7 Жыл бұрын
Could you kindly provide me with the PowerPoint slides for the cryptography topics at your earliest convenience? I am in great need of these slides and their contents are of utmost importance to my studies.
@bhushanamkommu8875
@bhushanamkommu8875 Жыл бұрын
Hai sir.pls provide me ppt for this concept.
@shahebealam683
@shahebealam683 Жыл бұрын
Shame on iit teacher seeing you sir..
@shahebealam683
@shahebealam683 Жыл бұрын
I never ever
Bike Vs Tricycle Fast Challenge
00:43
Russo
Рет қаралды 74 МЛН
From Small To Giant Pop Corn #katebrush #funny #shorts
00:17
Kate Brush
Рет қаралды 47 МЛН
Новый уровень твоей сосиски
00:33
Кушать Хочу
Рет қаралды 4,4 МЛН
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
COMP6441 : Hashes, Preimage and collision resistance
20:04
Adam Smallhorn
Рет қаралды 19 М.
What is a Cryptographic Hashing Function? (Example + Purpose)
7:08
Whiteboard Crypto
Рет қаралды 90 М.
Running Linux in Windows
23:22
ExplainingComputers
Рет қаралды 3,5 М.
Chapter 11 - Cryptographic Hash Functions
28:21
Hussein Fadl
Рет қаралды 8 М.
NETWORK SECURITY - MD5 ALGORITHM
31:30
Sundeep Saradhi Kanthety
Рет қаралды 135 М.
Cybersecurity Architecture: Application Security
16:36
IBM Technology
Рет қаралды 64 М.
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,6 МЛН
Bike Vs Tricycle Fast Challenge
00:43
Russo
Рет қаралды 74 МЛН