Understanding SHA-1: How Cryptographic Hash Functions Work π
Discover the fundamentals of SHA-1, a key cryptographic hash function, and learn how it ensures data security in this beginner-friendly guide to cryptographic hashes.

Fullstack Academy
69.1K views β’ Jan 27, 2017

About this video
Learn more advanced front-end and full-stack development at: https://www.fullstackacademy.com
SHA-1 stands for Secure Hash Algorithm 1, a cryptographic hash function developed by the NSA that can be used to verify that a file has been unaltered. In this video, we go over the basic features and common implementations of cryptographic hash functions before diving into the inner workings of a Javascript implementation of the SHA-1 function. Although out of use now, walking through the hash function code provides valuable insight into how these algorithms work.
Watch this video to learn:
- What are Cryptographic Hash Functions
- Practical uses for Cryptographic Hash Functions
- How does SHA-1 work
SHA-1 stands for Secure Hash Algorithm 1, a cryptographic hash function developed by the NSA that can be used to verify that a file has been unaltered. In this video, we go over the basic features and common implementations of cryptographic hash functions before diving into the inner workings of a Javascript implementation of the SHA-1 function. Although out of use now, walking through the hash function code provides valuable insight into how these algorithms work.
Watch this video to learn:
- What are Cryptographic Hash Functions
- Practical uses for Cryptographic Hash Functions
- How does SHA-1 work
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
69.1K
Likes
1.1K
Duration
12:16
Published
Jan 27, 2017
User Reviews
4.7
(13) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.