Network Security - SHA 512 (Authentication Algorithm)
Offered By: Sundeep Saradhi Kanthety via YouTube
Course Description
Overview
Learn about the SHA-512 authentication algorithm in this comprehensive 42-minute video tutorial. Explore the five key steps of the Secure Hash Algorithm, including padding, appending, buffer initialization, block processing, and hash code generation. Dive into the intricacies of the algorithm's structure, including the block diagram, round function, word size, and conditional functions. Gain a thorough understanding of this crucial network security component and its application in authentication processes.
Syllabus
Introduction
Secure Hash
Gather
Steps
Block Diagram
Round Function
Word Size
Conditional Functions
Authentication Algorithm
Taught by
Sundeep Saradhi Kanthety
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera