Learn about the SHA-512 authentication algorithm in this comprehensive 42-minute video tutorial. Explore the five key steps of the Secure Hash Algorithm, including padding, appending, buffer initialization, block processing, and hash code generation. Dive into the intricacies of the algorithm's structure, including the block diagram, round function, word size, and conditional functions. Gain a thorough understanding of this crucial network security component and its application in authentication processes.
Overview
Syllabus
Introduction
Secure Hash
Gather
Steps
Block Diagram
Round Function
Word Size
Conditional Functions
Authentication Algorithm
Taught by
Sundeep Saradhi Kanthety