Hashing Algorithms and Security - Computerphile
1,494,917
Published 2013-11-08
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out.
More from Tom Scott: youtube.com/user/enyay and twitter.com/tomscott
www.facebook.com/computerphile
twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Pigeon Sound Effects courtesy of www.freesfx.co.uk/
Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: bit.ly/bradychannels
All Comments (21)
-
It'll take you an hour to explain? Great! Who else wants a 1h computerphile special with Tom Scott? :D
-
3:41 That's an… interesting rocket.
-
Just realized the opening title card says "
" and the end title says " ".... -
Someone clearly had a bit of fun drawing that cocket... er I mean rocket.
-
I love this guy. he's like the James Grime of programming. he's just so animated and passionate about what he's talking about, all the time, it's really cool.
-
Damn.... someone who truly breaks things down to the best way ones can understand. Thank You tons! 9yrs later LOL.
-
1:37 It's not always bad to have a very very fast hashing algorithm, it's actually very good to have a fast hashing algorithm when using it for the file checking stuff explained earlier. The only time you don't want a fast hashing algorithm is when it deals with security, mainly hashing passwords.
-
Tom Scott is the only reason I subscribe to this channel. He has so much enthusiasm that makes me want to know more about the subject he's explaining.
-
Watching this video 9 years after it was uploaded, he was right SHA-1 is broken now but still incredible helpful to get a high level view over that topic!
-
These videos with Tom Scott are my favorite on computerphile. You should do more with him!
-
The download verification hash is usually to verify that the download was received without being corrupted during transmission, not really for security.
-
Very clear, no bullshit introduction to skip. Right to the core. Thanks a lot.
-
Sometimes webistes deny a password reset since the new password is "too similar" to the old one. How do they know this is all they have is a hash?
-
My wife loves Numberphile but often doesn't really understand all the content in a video. She really particularly likes James Grime. Now I know how she feels! I don't understand much of what Tom Scott says, but he's just so utterly watchable and engaging!
-
Awesome video Tom! In a previous job i use to test slot game software and for verification of the program we use to use multiple algorithms like MD5, SHA-1 and SHA-2 to ensure what we approved in the lab is what gets used in the fields.
-
That moon rocket looks very similar to.. uhh..
-
I was surprised to see that this video was made 9 years ago, and still a very good resource. Thanks!
-
I would love to see a whole series about computer science, or security, by Tom Scott.
-
I love seeing Videos with Tom, he is just awesome and the topics are interesting.
-
You are by far the best of the computerphiles. The sorting guy is good too, but wavey-hair is superb.