Hashing Algorithms & Security Explained π | Computerphile
Discover how hashing algorithms protect file integrity, their security strengths, and potential vulnerabilities. Watch now for clear insights from Computerphile!

Computerphile
1.6M views β’ Nov 8, 2013

About this video
Audible free book: http://www.audible.com/computerphile
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out.
More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Pigeon Sound Effects courtesy of http://www.freesfx.co.uk/
Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out.
More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Pigeon Sound Effects courtesy of http://www.freesfx.co.uk/
Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.6M
Likes
35.2K
Duration
8:12
Published
Nov 8, 2013
User Reviews
4.8
(321) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now