Understanding SHA: How Secure Hashing Algorithms Work πŸ”

Discover how SHA1 creates unique, seemingly random hash strings from files in this clear explanation by Dr. Mike Pound. Watch the full video for extra insights!

Understanding SHA: How Secure Hashing Algorithms Work πŸ”
Computerphile
1.3M views β€’ Apr 11, 2017
Understanding SHA: How Secure Hashing Algorithms Work πŸ”

About this video

Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings.

EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U
Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg

http://www.facebook.com/computerphile
https://twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: http://bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

1.3M

Likes

23.8K

Duration

10:21

Published

Apr 11, 2017

User Reviews

4.8
(262)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.