Hello Sir, Thank you very much for wonderfull video and would like to ask you one question that key uses in hmac is same key that aes or 3des uses for encryption or dh generate another shared secrect key for hmac
Probably the shared secret key can be encrypted with asymmetric algorithm (RSA or ElGamal) and then send to other person. This is also known as public-key cryptography. E.g. GnuPG or PGP uses this or SSL/TLS to encrypt communication between a web browser and a webserver.
The shared secret key can be encrypted with asymmetric algorithm (RSA or ElGamal) and then send to other person. This is also known as public-key cryptography. E.g. GnuPG or PGP uses this or SSL/TLS to encrypt communication between a web browser and a webserver.
Watched multiple videos on HMAC explanation, finally found the ONE! TYSM Prof!
Thank you Sir for the detailed explanation.
You are welcome
Thanks for sharing this video , detailed and clear concept about MAC and HMAC
Wonderful explanation, thank you very much sir
Thank you so much for the wonderful explanation. It was so helpful for me.
Thanks very much. This helps a lot
Hello Sir, Thank you very much for wonderfull video and would like to ask you one question that key uses in hmac is same key that aes or 3des uses for encryption or dh generate another shared secrect key for hmac
thanks for the video. Can you please tell me the drawbacks of implementing encrypt-then-MAC compared to other approaches? Thanks 🙂
Thanks for this series. Are you planning to do a short one about elliptic cryptography by any chance? :)
Sure..am trying to understand elliptic curves in depth. I will post a video soon on that . Thanks for the feedback
Yes, Thank you!
You're welcome!
Thank you sir.
Thanks sir
Great
Sir what tool or software you are using for making these videos
Sir.. I use OBS for video recording
@@SatishCJ Thank you sir for your wonderful lectures
How do users share the secrete key between each other?
Probably the shared secret key can be encrypted with asymmetric algorithm (RSA or ElGamal) and then send to other person. This is also known as public-key cryptography. E.g. GnuPG or PGP uses this or SSL/TLS to encrypt communication between a web browser and a webserver.
sir please can u provide this ppt ?
you said user A gets key, and sends it to user B, but that could be intercepted and this whole scheme fails
The shared secret key can be encrypted with asymmetric algorithm (RSA or ElGamal) and then send to other person. This is also known as public-key cryptography. E.g. GnuPG or PGP uses this or SSL/TLS to encrypt communication between a web browser and a webserver.
can you provide me this ppt file please
Hi
thank you sir
Most welcome