Understanding SHA: How Secure Hashing Algorithms Work π
Discover how SHA1 creates unique, seemingly random hash strings from files in this clear explanation by Dr. Mike Pound. Watch the full video for extra insights!

Computerphile
1.3M views β’ Apr 11, 2017

About this video
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings.
EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U
Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U
Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.3M
Likes
23.8K
Duration
10:21
Published
Apr 11, 2017
User Reviews
4.8
(262) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.