Understanding SHA-1: How Cryptographic Hash Functions Work πŸ”

Discover the fundamentals of SHA-1, a key cryptographic hash function, and learn how it ensures data security in this beginner-friendly guide to cryptographic hashes.

Understanding SHA-1: How Cryptographic Hash Functions Work πŸ”
Fullstack Academy
69.1K views β€’ Jan 27, 2017
Understanding SHA-1: How Cryptographic Hash Functions Work πŸ”

About this video

Learn more advanced front-end and full-stack development at: https://www.fullstackacademy.com

SHA-1 stands for Secure Hash Algorithm 1, a cryptographic hash function developed by the NSA that can be used to verify that a file has been unaltered. In this video, we go over the basic features and common implementations of cryptographic hash functions before diving into the inner workings of a Javascript implementation of the SHA-1 function. Although out of use now, walking through the hash function code provides valuable insight into how these algorithms work.

Watch this video to learn:

- What are Cryptographic Hash Functions
- Practical uses for Cryptographic Hash Functions
- How does SHA-1 work

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

69.1K

Likes

1.1K

Duration

12:16

Published

Jan 27, 2017

User Reviews

4.7
(13)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.