Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Network Security - SHA 512 (Authentication Algorithm)

Sundeep Saradhi Kanthety via YouTube

Overview

Learn about the SHA-512 authentication algorithm in this comprehensive 42-minute video tutorial. Explore the five key steps of the Secure Hash Algorithm, including padding, appending, buffer initialization, block processing, and hash code generation. Dive into the intricacies of the algorithm's structure, including the block diagram, round function, word size, and conditional functions. Gain a thorough understanding of this crucial network security component and its application in authentication processes.

Syllabus

Introduction
Secure Hash
Gather
Steps
Block Diagram
Round Function
Word Size
Conditional Functions
Authentication Algorithm

Taught by

Sundeep Saradhi Kanthety

Reviews

Start your review of Network Security - SHA 512 (Authentication Algorithm)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.