Really nice video. In HMAC, why do you need to hash both the key and the message? I thought about it and if you just hashed the key, then you can't verify the integrity of the message, and if you just hashed the message, you don't know if the message came from Alice. Is that correct? What if someone had the key in this symmetric algorithm? then they could still send a message hashing both their message and the key and the recipient wouldn't really know who it came from because this hacker had the same key and the recipient wouldn't know what the sender wanted to send originally.
Very informative ! Thank you very much ! :)
good course, this is a rare course in youtube
plz do not stop uploading videos.
Thanks for this great series. All videos illustrate the basic very well. Help me a lot for my cybersecurity class.
Which cyber security class do you join? And do you get a job after completing it ?
good content
Great Content!!!!!
Thank you for this course!
great
❤
Really nice video. In HMAC, why do you need to hash both the key and the message? I thought about it and if you just hashed the key, then you can't verify the integrity of the message, and if you just hashed the message, you don't know if the message came from Alice. Is that correct? What if someone had the key in this symmetric algorithm? then they could still send a message hashing both their message and the key and the recipient wouldn't really know who it came from because this hacker had the same key and the recipient wouldn't know what the sender wanted to send originally.
i guess pgp can be code for strings but for files i guess RSA,AES are the best for files(correct me if am wrong)