E-Security Week 3 - Hashing and MAC
Offered By: Bill Buchanan OBE via YouTube
Course Description
Overview
Dive into the world of cryptographic hashing and message authentication codes (MAC) in this comprehensive 90-minute lecture. Explore essential concepts including MD2, MD4, MD5, SHA-1, and SHA-3 algorithms, as well as salting techniques and collision prevention. Learn about specialized hashing methods like Murmur, FNV, and Bloom Filter. Discover password security implementations such as LM Hash, Bcrypt, and PBKDF2. Investigate OpenSSL hash passwords and various one-time password systems including TOTP and HOTP. Gain practical knowledge on integrity checking, digital certificates, and system configuration for enhanced security. By the end of this session, acquire a solid foundation in hashing techniques and their applications in modern cybersecurity.
Syllabus
Introduction
Hashing
Open SSL
Integrity checking
Digital certificates
Hash values
Passwords
Simple Passwords
SHA256
Housing Methods
Reviews
Salting
Collision
Basic Method
Windows Password
System Configuration
Crack
Hash crackers
Creating a secret key
Onetime passwords
Taught by
Bill Buchanan OBE
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera