Комментарии:
Excellent material. Thank you!
ОтветитьThat Was Great !
Ответитьhow is classical symmetric cipher different compared to modern cipher ?
ОтветитьThanks
ОтветитьGreat explanations, thanks a lot!
ОтветитьThis is my first time watching one of your videos and I loved your teaching style. Subscribed!!
ОтветитьHello - World.... I like what you did there, lol!
ОтветитьThis lecture is golden!!
Helped me clear a lot of basics and really understand the concepts!
Fantastic explanation. Thank you!
ОтветитьOne argument I heard from cryptographers pondering about the futility using 'salt' is that if someone has access to the database where you store the hashed passwords, the attackers already had access to your critical data anyway.
ОтветитьMallory 's hairdo alone is criminal!
Ответитьyour example why MD5 isn't secure doesn't really show anything. Its equally easy to generate table would it be 128 bit or 512 bit hash. Otherwise awesome video.
ОтветитьExcellent video and explaining the technology. However, I have a situation where I don't know how I would adapt the concepts you explained because the scenario is slightly different. Your example works interactively by comparing user passwords with stored hash values. My scenario is for an automated process (no user interaction at all) and the credentials are self-contained in the program package. These must not be known to the user or anyone who can get a hold of the file(s) containing them.
Here is a live example … We have a company application that requires administrative rights to execute but our users only have standard Windows user permissions. I repackaged the application into a single EXE executable script to conceal the admin credentials that are included in the script code. However, I discovered that compiling the script is not enough because the EXE file can be decompiled or someone can use other programs to see the contents.
How can I adapt the concepts you explained in your video this my scenario? I need to be able to execute a self-contained application package locally (no network or internet resources) and with specific credentials while protecting said credentials from the local user or anyone who might get a hold of the EXE file containing the credentials. The application needs to use these credentials at run time to perform its tasks.
Your insight is most appreciated.
"never see Windows or Mac again in your life"
deal!
💙💙
Ответитьthese 'keys'.... would you encrypt your 'private key' in case someone tries to steal it?
ОтветитьGreat explanation, Thank you very much
ОтветитьAwesome Awesome 🤩 . I’ve learned a lot!🤝
ОтветитьThe joke at the end..🤦🏿♂️
ОтветитьAmazing!
ОтветитьExcellent, just excellent.
ОтветитьWow! Awesome explanation sir.
ОтветитьGreat explanation... Thank you very much!!!
ОтветитьThis is a great video! Your explanation is very to the point without any fluff and presented in a way that doesn't make me wander to the next video. Thank you for the information in such a presentable way!
ОтветитьAaaaand, now I get it. THANK YOU!
ОтветитьThis is such an amazingly created video. Thanks for covering the multiple related aspects in one crisp video.
ОтветитьThis was super informativem thank you!
ОтветитьI wish you were in my country to solve all my hashes and keys - Purchase from 2010 N 2011 N 2013 😥
ОтветитьAmazing
ОтветитьCommendable explanation.
Thanks for sharing.
wow, thank you so much. "... never see a windows or Mac ..." joke cracked me up 🤣
ОтветитьBut if the hasing value also changed according to changed document by attacker and give to receiver
ОтветитьThanks for the video Professor. Very clear explanation to follow. Hashing technique was particularly useful for us in de-duplicating big data sets. Have shared it in a video.
ОтветитьMain difference is that encryption is 2 way(Can be reverted to original string),
and Hashing is 1 way(Cannot be reverted to original string)
the common practical way:
1) encrypt+hash+salter
2) Data send through encrypted package
3) Unencrypt the received data
4) Check on the hash and token should return valid/true.
5) do the things...
Regarding MD5, shouldn't really use it, if still insisted, must merge with add-on unique hashing algorithm to generate the only unique result.
In reality, there are still tons of systems still using the MD5 hashing basis but they modified with other unique hashing algorithm.
top video
ОтветитьThat video is gold, thank you!
Ответитьgoat
ОтветитьLove this channel
ОтветитьAmazingly well explained sir. Very grateful for it. Subscribed.
ОтветитьThanks lots Pro you make it clear even though im not computer background
ОтветитьDamn this is good , not good amazing !
ОтветитьThank you sir!
ОтветитьHi, how can 64 units represent all the combination of all the files and or passwords in the world? thank you
ОтветитьThank you so much for this video! Enjoyed it
ОтветитьThank you professor Sluiter
ОтветитьBEST! 🧨🔥🔥
Ответить