We detect alterations in messages using a cryptographic hash function with a shared secret key.
I welcome comments and suggestions on how to improve these videos!
Video notes: cys.me/vid/c05.
Video #6 gives examples of weak crypto used in DVD technology vimeo.com/199858435
The previous video describes the SSL/TLS protocol vimeo.com/197456690
See the entire Cryptosmith series in its album Cryptosmith Series