Hashing Algorithms and Security - Computerphile

1,494,917
0
Published 2013-11-08
Audible free book: www.audible.com/computerphile
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out.

More from Tom Scott: youtube.com/user/enyay and twitter.com/tomscott

www.facebook.com/computerphile
twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Pigeon Sound Effects courtesy of www.freesfx.co.uk/

Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: bit.ly/bradychannels

All Comments (21)
  • @Kram1032
    It'll take you an hour to explain? Great! Who else wants a 1h computerphile special with Tom Scott? :D
  • @_zio__
    Just realized the opening title card says "" and the end title says ""....
  • @andy4226uk
    Someone clearly had a bit of fun drawing that cocket... er I mean rocket.
  • @razorborne
    I love this guy. he's like the James Grime of programming. he's just so animated and passionate about what he's talking about, all the time, it's really cool.
  • @Orion3000k
    Damn.... someone who truly breaks things down to the best way ones can understand. Thank You tons! 9yrs later LOL.
  • @NedTheDread
    1:37 It's not always bad to have a very very fast hashing algorithm, it's actually very good to have a fast hashing algorithm when using it for the file checking stuff explained earlier. The only time you don't want a fast hashing algorithm is when it deals with security, mainly hashing passwords.
  • @RolandZeFerret
    Tom Scott is the only reason I subscribe to this channel. He has so much enthusiasm that makes me want to know more about the subject he's explaining.
  • @DI__KAI
    Watching this video 9 years after it was uploaded, he was right SHA-1 is broken now but still incredible helpful to get a high level view over that topic!
  • @JoshuaHorn
    These videos with Tom Scott are my favorite on computerphile. You should do more with him!
  • @JoeTaber
    The download verification hash is usually to verify that the download was received without being corrupted during transmission, not really for security.
  • @lfa8903
    Very clear, no bullshit introduction to skip. Right to the core. Thanks a lot.
  • @Surfurplex
    Sometimes webistes deny a password reset since the new password is "too similar" to the old one. How do they know this is all they have is a hash?
  • @AlanKey86
    My wife loves Numberphile but often doesn't really understand all the content in a video. She really particularly likes James Grime. Now I know how she feels! I don't understand much of what Tom Scott says, but he's just so utterly watchable and engaging!
  • @MatthewNelson104
    Awesome video Tom! In a previous job i use to test slot game software and for verification of the program we use to use multiple algorithms like MD5, SHA-1 and SHA-2 to ensure what we approved in the lab is what gets used in the fields.
  • I was surprised to see that this video was made 9 years ago, and still a very good resource. Thanks!
  • @AlexanderMarsh
    I would love to see a whole series about computer science, or security, by Tom Scott. 
  • @SummDota
    I love seeing Videos with Tom, he is just awesome and the topics are interesting.
  • @icanrememberthis
    You are by far the best of the computerphiles. The sorting guy is good too, but wavey-hair is superb.