YoVDO

Network Security - SHA 512 (Authentication Algorithm)

Offered By: Sundeep Saradhi Kanthety via YouTube

Tags

Cryptography Courses Network Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about the SHA-512 authentication algorithm in this comprehensive 42-minute video tutorial. Explore the five key steps of the Secure Hash Algorithm, including padding, appending, buffer initialization, block processing, and hash code generation. Dive into the intricacies of the algorithm's structure, including the block diagram, round function, word size, and conditional functions. Gain a thorough understanding of this crucial network security component and its application in authentication processes.

Syllabus

Introduction
Secure Hash
Gather
Steps
Block Diagram
Round Function
Word Size
Conditional Functions
Authentication Algorithm


Taught by

Sundeep Saradhi Kanthety

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera