Completion requirements
View
This video will provide a MAC overview and a road map for the rest of the unit. It is important to consider how the previous units involving asymmetric cryptography, symmetric cryptography, and hash functions are instrumental to MAC construction. Combining these techniques in different ways allows you to address concerns fundamental to network security.
Source: love by toto, https://www.youtube.com/watch?v=2twiOyQR1tM This work is licensed under a Creative Commons Attribution 3.0 License.