We detect alterations in messages using a cryptographic hash function with a shared secret key.
Video notes: cys.me/vid/c05.
Video #6 gives examples of weak crypto used in DVD technology vimeo.com/199858435
The previous video describes the SSL/TLS protocol vimeo.com/197456690
See the entire Cryptosmith series in its album vimeo.com/album/4229550