Understanding SHA: How Secure Hashing Algorithms Work 🔐

Discover how SHA1 creates unique, seemingly random hash strings from files in this clear explanation by Dr. Mike Pound. Watch the full video for extra insights!

Computerphile1.3M views10:21

About this video

Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings. EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.

4.8

262 user reviews

Write a Review

0/1000 characters

User Reviews

0 reviews

Be the first to comment...

Video Information

Views
1.3M

Total views since publication

Likes
23.8K

User likes and reactions

Duration
10:21

Video length

Published
Apr 11, 2017

Release date

Quality
hd

Video definition

Captions
Available

Subtitles enabled

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Spain under the topic 'g'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!