Passwords & hash functions (Simply Explained)

Поделиться
HTML-код
  • Опубликовано: 2 апр 2018
  • How can companies store passwords safely and keep them away from hackers? Well let's find out!
    With all the data breaches lately, it's likely that the password of one of your accounts has been compromised. Hackers now might know the password you've used, but they also might not.. To understand why, we'll take a look at what methods a company can use to protect user passwords. We'll take a look at encryption, hash functions and a multilayer approach!
    📚 Sources
    Can be found on my website:
    savjee.be/videos/simply-expla...
    🌍 Social
    Twitter: / savjee
    Facebook: / savjee
    Blog: savjee.be
    💌 Newsletter: newsletter.savjee.be (no more than once a month)
    ❤️ Become a Simply Explained member: / @simplyexplained
  • НаукаНаука

Комментарии • 196

  • @tar509
    @tar509 4 года назад +55

    We were just shown this as a part of an information systems security lecture, I figured I'd actually go ahead and give it a like because it's simple and informative

  • @md.riyasathossain590
    @md.riyasathossain590 4 года назад +7

    Thank you, Sir! It did helped me a lot in learning how hash functions actually work! And also Thank You for simplifying the concept!

  • @Logical-Sense
    @Logical-Sense 6 лет назад +83

    Keep up the good work mate, it was informative.

  • @siddharthgarg1985
    @siddharthgarg1985 6 лет назад +108

    Brilliant video.. I love how you explain such complex concepts in a simple manner.. Please keep up the good work

    • @vz7742
      @vz7742 Год назад +2

      good mornin sir!

  • @BobbyBundlez
    @BobbyBundlez 4 года назад +6

    AMAZING. really appreciated you goign through drop Box's encryption method.
    started coding 8-9 months ago, doing JS now and just started learning how to use the scrypt function as well as salting passwords etc... watching this video made me excited for all the deeper things you can do... maybe one day i shall make it a goal to recreate and code that level of password security like dropbox has! cool vid. thanks again
    anyone wanna share their experience with coding thus far? anyone think im doin ok learning this stuff after 8 months? or am i behind.... lol... sometimes i can't tell tbh
    i still love learning all this stuff regardless lol

  • @Lallushe
    @Lallushe 3 года назад

    Wow, I can't believe how well you explained that! Thank you sir!

  • @rahulbiswas9971
    @rahulbiswas9971 4 года назад +2

    the channel name is perfect
    thanks dude. 💖

  • @JavaScriptRoom
    @JavaScriptRoom 5 лет назад +1

    Great as always! Please keep sharing such a good stuff!

  • @GloryRay
    @GloryRay 6 лет назад

    Great job. I love every single one of your videos!

  • @Lukas-kh5gu
    @Lukas-kh5gu 6 лет назад +11

    amazing video. learnt a lot, going to share :-)

  • @ziomanzo
    @ziomanzo 5 лет назад +2

    You really explain things simply ✌️

  • @marcusswedin
    @marcusswedin 4 года назад

    Reallly informative! Thanks!

  • @declanz5067
    @declanz5067 2 года назад

    Awesome video - very easy to understand and succinct, it flowed well too - very helpful thank you!

  • @MiRaje8086
    @MiRaje8086 3 года назад +1

    This is awesome man, thanks for explaining.

  • @RubeniAlimasi
    @RubeniAlimasi 5 дней назад

    Learned a great deal of things thanks to this video. Thank you.

  • @LuisFelipe-pq9lr
    @LuisFelipe-pq9lr 3 месяца назад

    This video was incredible, thank u so much

  • @sebastiendebons421
    @sebastiendebons421 6 лет назад

    Very interesting video ! Thank you for all this nice work.

  • @flowerofash4439
    @flowerofash4439 2 года назад

    clear and easy to understand this is perfect

  • @0_-
    @0_- 4 года назад

    This is the first video I saw of you!

  • @browneyedbabes7863
    @browneyedbabes7863 Год назад

    awesome video! Thank you!

  • @maliqattan
    @maliqattan 2 года назад

    Very nice descreption. Loved it. Thank you very much ❤❤❤

  • @tymothylim6550
    @tymothylim6550 3 года назад

    Thank you very much for this video! Certainly learnt a lot from this and would be learning more about it in detail :)

  • @basmamp4834
    @basmamp4834 3 года назад

    Very informative one.. Liked it.. Well explained!! 💯

  • @DayTradingCourse
    @DayTradingCourse 4 года назад

    Excellent and clear explanation.

  • @JamieWFilms
    @JamieWFilms 4 года назад

    Amazing video, thank you so much mate!

  • @tomgi859
    @tomgi859 3 года назад +2

    Awesome video, very friendly and pleasant to watch! about dropbox- if they're not saving the keys in their db's, where do they save them? physical devices maybe?

  • @swapniljoshi1033
    @swapniljoshi1033 3 года назад

    Explained very simply thank you

  • @MisterSkraetsch
    @MisterSkraetsch 5 лет назад +1

    nice video and very well explalined - thanks a lot!!!! :)😁👍✌️

  • @suyashraut142
    @suyashraut142 3 года назад

    very informative . best explanation .
    keep it up!!!

  • @Lollipop2018
    @Lollipop2018 Месяц назад

    Wow. perfect video!!

  • @chriseaguilar7
    @chriseaguilar7 Год назад

    Great video!

  • @TastySanchez
    @TastySanchez 4 года назад

    Wow so interesting. Really enjoyed this vid

  • @UltirianHeavyIndustry
    @UltirianHeavyIndustry 3 года назад

    Simple and explains a lot thank you :)

  • @dhliu9687
    @dhliu9687 2 года назад

    Thank you sir Nice explain !!! thumb up

  • @ahmedaj2000
    @ahmedaj2000 3 года назад

    thank you, very clear!

  • @shotx333
    @shotx333 4 года назад

    Very well explained, thanks

  • @abdullahsultan6024
    @abdullahsultan6024 6 лет назад

    It's very nice video.. thanks for your efforts and keep it going

  • @ImranPollob
    @ImranPollob 2 года назад

    Excellent explanation

  • @saidkarimsaidmahmudov3048
    @saidkarimsaidmahmudov3048 5 лет назад +1

    Well, it was really helpful video

  • @kgreene104
    @kgreene104 5 лет назад +5

    Good job. Studying for Security+ exam here and the cryptography has been one thing I've found it hard to get into. It helps to have different explanations of it.

    • @drrider100
      @drrider100 4 года назад

      Agree. Getting ready to take mine. The more I read the more confusing it is for me. But this video just explained it all. I am no. Longer confused.

  • @datag1199
    @datag1199 Год назад

    Great video - thank you

  • @lynnelenatorbay1450
    @lynnelenatorbay1450 3 года назад

    Great video! thanks

  • @limontec
    @limontec 6 лет назад

    Excellent work

  • @midhatbasit7306
    @midhatbasit7306 2 года назад

    Best explanation

  • @elasriabdelhamid5659
    @elasriabdelhamid5659 3 года назад

    Very educative video :)

  • @omarelalaoui7591
    @omarelalaoui7591 4 года назад

    thank u man it helped a lot ...!

  • @Vagelis_Prokopiou
    @Vagelis_Prokopiou 6 лет назад

    Nice video man.

  • @TravelNomad
    @TravelNomad 6 лет назад

    Awesome, thank you :)

  • @humayunnaveedkhan1281
    @humayunnaveedkhan1281 3 года назад

    very well explained

  • @himanshu4807
    @himanshu4807 2 года назад

    wow......thank you so much...keep it up plzzz

  • @robertogarcia4637
    @robertogarcia4637 4 года назад +3

    thank you very much for the instructional - learned a lot (specially w/the salt & cost things). Nice !!! Furthermore, your voice is very pleasant so double congrats!

  • @hashrate207
    @hashrate207 4 года назад

    Good work.

  • @iamgarance8191
    @iamgarance8191 4 года назад

    Very clear explanation , well done

  • @jason_samosa
    @jason_samosa 2 года назад

    Excellent content

  • @MrShika666
    @MrShika666 5 лет назад

    keep up the good work :D

  • @govindmenon2196
    @govindmenon2196 6 лет назад +5

    Savjee next video should be about delegated proof of stake

  • @JagadishTalluri
    @JagadishTalluri 4 года назад

    Keep up the great work..!

  • @TuxHouseEdu
    @TuxHouseEdu 3 года назад

    Thank you

  • @philipg.5316
    @philipg.5316 5 лет назад

    So awesome!

  • @seixasribeiro6715
    @seixasribeiro6715 3 года назад

    thank you so much.

  • @sibincbaby
    @sibincbaby 5 лет назад

    thank you 😍

  • @rosalyna_24
    @rosalyna_24 3 года назад +1

    thank you so much for this vid it is very informative

  • @dev-bv5zg
    @dev-bv5zg 4 года назад +1

    I use a extremely long custom hashing method for my server that uses many variables indented to that user only

  • @Alternox
    @Alternox 3 года назад

    this video is underrated

  • @rain_altman_009
    @rain_altman_009 4 месяца назад

    NICE VIDEO

  • @xMAJxgames
    @xMAJxgames 2 года назад

    Thanks 👌👀

  • @youssefAbdelMagid
    @youssefAbdelMagid 4 года назад

    very good video , I learned the concepts in a very good way... can you kindly do a simple javascript project to make the 3 kind of protection (hashing + bcrypt + encryption) to show us how to do it practically as well

  • @amicam5459
    @amicam5459 Год назад

    brilliant

  • @quintonconoly
    @quintonconoly Год назад +1

    nice!

  • @flyhigh6047
    @flyhigh6047 5 лет назад

    solid info :D

  • @IchwanulFadhli
    @IchwanulFadhli 4 года назад

    Just like the channel's name, Simply Explained!

  • @Sergio0694
    @Sergio0694 6 лет назад +2

    Nice video!
    I have a question: what about saving each password with its encrypted version, using the password itself as encryption key?
    This way each stored password would have a unique encryption key, instead of a single AES key shared among all the saved passwords.

    • @neoxr9655
      @neoxr9655 Год назад

      But how would you store the key? That kinda just adds an unnecessary step without gaining anything

  • @jakub9640
    @jakub9640 2 года назад +1

    Cyber Security Dev: So which password protection do you want to use?
    Dropbox: y e s

  • @MrRigdensChannel
    @MrRigdensChannel 6 лет назад

    Nice work. Thanks for helping to clear this up.

  • @dannyasper2664
    @dannyasper2664 4 года назад

    tanks dude

  • @ramanabalachandhran
    @ramanabalachandhran 4 года назад

    Thanks a lot for the succinct adumbration. And by the way.
    04:11 ROFL 😂

  • @pcosgrove52
    @pcosgrove52 4 месяца назад

    thanks agfain...

  • @osiris5449
    @osiris5449 5 лет назад

    My encryption/decryption algorithms I have (for PHP) take in a string, add some salt, some hashing and then locks it with a key then encrypts or decrypts that with a very “quarantined” password that’s been... Treated. It’s strong asf.

  • @dimitrisfou6908
    @dimitrisfou6908 2 года назад

    u are best

  • @Davegbuf
    @Davegbuf Год назад

    Excellent video and explaining the technology. However, I have a situation where I don't know how I would adapt the concepts you explained because the scenario is slightly different. Your example works interactively by comparing user passwords with stored hash values. My scenario is for an automated process (no user interaction at all) and the credentials are self-contained in the program package. These must not be known to the user or anyone who can get a hold of the file(s) containing them.
    Here is a live example … We have a company application that requires administrative rights to execute but our users only have standard Windows user permissions. I repackaged the application into a single EXE executable script to conceal the admin credentials that are included in the script code. However, I discovered that compiling the script is not enough because the EXE file can be decompiled or someone can use other programs to see the contents.
    How can I adapt the concepts you explained in your video this my scenario? I need to be able to execute a self-contained application package locally (no network or internet resources) and with specific credentials while protecting said credentials from the local user or anyone who might get a hold of the EXE file containing the credentials. The application needs to use these credentials at run time to perform its tasks.
    Your insight is most appreciated.

  • @jeremysurls
    @jeremysurls 6 лет назад

    PLEASE do a video on Ripple!

  • @ozzyfromspace
    @ozzyfromspace 3 года назад

    When you put up that list of the top 10 passwords, I was like, “been there, done that” 😂. These days I let my Apple devices generate and store codes for me

  • @yousribelhaj9243
    @yousribelhaj9243 4 года назад

    danku wel

  • @user-tt7jz1tz6c
    @user-tt7jz1tz6c 4 года назад

    i was wondering how to make a vivid video like this, what kind of software tool

  • @PaulinaJuba
    @PaulinaJuba Год назад

    Is hashing possible for other things like live facial recognition or fingerprints?

  • @beholdandfearme
    @beholdandfearme 3 года назад

    How secure is smashing the keyboard at random while alternating the shift key?

  • @lucasguaru
    @lucasguaru 3 года назад

    Man, great job there. How do you do it? I would love to the the animations in portuguese. I feel it's missing here in Brazil the way you explain.

    • @hamza-325
      @hamza-325 3 года назад

      @@simplyexplained4601 You are a scammer! What a dirty technic to use the channel name and icon to do your black business.

  • @chinonsoiwundu5782
    @chinonsoiwundu5782 2 года назад +1

    You mentioned something about encryption key being kept separately, how can it be queried to work on the web application? Kindly put more light

  • @lucasguaru
    @lucasguaru 3 года назад

    On 4:38 you said to use different salt but I can't see it happening. If I use different salt, when I have to check the password, I would not know the used hash. If I keep it on the database, I would have the same problem as leaking the password. What I'm missing?

  • @parta_usti6219
    @parta_usti6219 6 лет назад +1

    Well explained!
    Why don't companies put a limit on number of login trials a computer can have? For example, can't they just reject the user for a limited period of time if they enter totally wrong credentials?

    • @simplyexplained
      @simplyexplained  6 лет назад +4

      Sure they can! But in this video I'm talking about a scenario in which an attacker has managed to breach the database and has all the (hashed) passwords in his possession.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      Ahh , that is not what he is talking about. If somebody stole the database of passwords. That is what he is referring to.
      For example a keypass file. Is a store of encrypted passwords. If somebody stole my drive and got them. They can pound on it forever. Eventually I will be long dead and turned to dust. The reason 'Dropbox' does all this is not just for a website long in. It is in case somebody steals the hashed and encrypted storage.
      You still have a lack of understanding about how this works. As far as the end user logging into a website.

  • @eswarprasad9773
    @eswarprasad9773 4 года назад

    Not only to maintain unique hashes...salting also provides extra security for example you can either append or prepend salt data..that requires lot of effort from hacker to figure out

  • @0_-
    @0_- 4 года назад

    what do they do with the salted hash?

  • @iceman71true12
    @iceman71true12 2 месяца назад

    so regardless of the fact that each of these different methods can be breached, best course of action is to have two forms of logging in to your account a text message to your phone that you have to input when logging in to an account.

  • @kostasmed1
    @kostasmed1 4 года назад

    top man

  • @walterlol
    @walterlol 3 года назад +3

    Excellent video but I am not understanding something:
    You use salt to generate a unique hash from a password (string).
    When a user re-logins and you want to see the hash of his password you would also have to RE-ADD that same "unique salt" that was given when the user created the account. How do you know that "unique salt" if it was randomly generated?

    • @ifqi.r
      @ifqi.r 2 года назад

      Same I don't understand this

    • @Maxxxxxxxxxxxxxxxxxxxxxxxxxxxx
      @Maxxxxxxxxxxxxxxxxxxxxxxxxxxxx Год назад

      You store the hashed password with the salt
      When you login, it checks if your login user/email exists in the db, if yes, then it adds the salt to the password you typed, then hash the combination and check with the hash

    • @walterlol
      @walterlol Год назад

      @@Maxxxxxxxxxxxxxxxxxxxxxxxxxxxx What if I get access to the salt you used to store the password? Isn't that a single point of failure?

    • @Maxxxxxxxxxxxxxxxxxxxxxxxxxxxx
      @Maxxxxxxxxxxxxxxxxxxxxxxxxxxxx Год назад

      @@walterlol yes but for that to happen, they would've already got access to your database.
      I probably forgot to mention that the salt is usually 32byte or 64byte

  • @apoorva5810
    @apoorva5810 Год назад

    How to get the hash text?

  • @natesh1
    @natesh1 6 лет назад

    Where would the store the salt for all the passwords. They don't store this salt then every time the passwords hashes will be different right? Do they hash the salt applied to a user's password or will they keep it encrypted with every user's email or something?

    • @simplyexplained
      @simplyexplained  6 лет назад

      You just store the salt together with the hash of the password. No need for encryption or anything like that.

  • @LiEnby
    @LiEnby 3 года назад

    on 'TamaTown Rewrtten' ii do sha512 then xor the resulting hash with some random bytes then sha512 it again
    the original game however stored them in plaintext as there reset pass thing expects to just.. get the password back

  • @Fluli
    @Fluli 5 лет назад +1

    How do they compare the hashes if there is random salt?

    • @joyanfernandes
      @joyanfernandes 4 года назад

      Salt is stored seperately alongside the password..

  • @maxmenius1319
    @maxmenius1319 3 года назад +3

    They should make a hash system that resets every hour

    • @MorphTW
      @MorphTW 2 месяца назад

      How would you check input password with the one you entered on registration? 😊