How Does SHA-1 Work - Intro to Cryptographic Hash Functions and SHA-1

Поделиться
HTML-код
  • Опубликовано: 20 окт 2024

Комментарии • 59

  • @akshaysalunke13
    @akshaysalunke13 5 лет назад +60

    SHA1 Explanation starts: (8:08)

  • @ruchamathure
    @ruchamathure 6 лет назад +21

    This was so helpful! I have to give a presentation (which I totally forgot about till today) on SHA-1 to my entire uni class & professor tomorrow and didn't know anything about it, but this video was so comprehensive, even to the uninitiated that I feel quite confident now!

    • @user-km6hc3ez6o
      @user-km6hc3ez6o 3 года назад +1

      How did your presentation go? :)

    • @ruchamathure
      @ruchamathure 3 года назад +6

      @@user-km6hc3ez6o It went great! Thanks for asking :)

  • @johnny2dabz
    @johnny2dabz 7 лет назад +11

    Best I've seen so far. Nice work.

  • @N1ghtR1der666
    @N1ghtR1der666 4 года назад +23

    initialize some variables... umm wat? what happened to explain things? in-fact after this point the whole explanation went out the window for most following steps

  • @madfangkills
    @madfangkills Год назад

    Definitely loved you walking through the algorithm. It's so much better breaking it down into understandable chunks

  • @kareemsharawi4778
    @kareemsharawi4778 5 лет назад +4

    It truly was a "great presentation Sam" :-) Thanks a lot!

  • @TheCTMcG
    @TheCTMcG 5 лет назад +5

    I didn't follow your reasoning on the 448 aspect of 512 mod 448. shouldn't it be mod 512 == 0 ?

    • @darkzero4608
      @darkzero4608 5 лет назад +5

      Yeah (512 MOD 448) is 64. and reverse way (448 MOD 512) is 448.
      So Right thing is i feeel (448 MOD 512) as later padding 64 bit length of array length gives 512 bit total length.

    • @TkiDeneb
      @TkiDeneb 5 лет назад +1

      @@darkzero4608 Yes you're right

  • @machinelearningid3931
    @machinelearningid3931 3 года назад

    Thanks, this is most concise explanation in the youtube

  • @bryandussanjimenez3316
    @bryandussanjimenez3316 4 года назад +1

    Wo, this is what I was looking for a long time, appreciate your job, thanks

  • @starkxz
    @starkxz 2 года назад

    Thanks Sam. That was really a great presentation 👍🏻

  • @adrianpilikser2195
    @adrianpilikser2195 2 года назад +1

    Although the video is really helpful and explains everything in great detail, I have to add that the shown h and k values are fundamentally different to those used in practice, thus producing completely different results.
    But otherwise it is a wonderful lesson dives deep in the workings of the SHA1 algorithm.

  • @swamysriman7147
    @swamysriman7147 4 года назад +6

    9:52
    Isn't that 448 mod 512?

    • @altairezio6850
      @altairezio6850 3 года назад +3

      Yup. I caught that too. He might have accidently swapped them.

  • @nadzeyahutsko1094
    @nadzeyahutsko1094 4 года назад

    The explanation is wonderful!

  • @wilsonbalderrama
    @wilsonbalderrama 6 лет назад

    amazing this explanation is the best one I've seen, kudos to the presenter

  • @zNeoDev
    @zNeoDev 6 лет назад +5

    I don't get the step 11 in how sha-1 works :/

  • @tymothylim6550
    @tymothylim6550 3 года назад

    Thank you very much for this video! Really interesting and educational! :)

  • @alejandroamoros5339
    @alejandroamoros5339 2 года назад

    Wow what a great video and a great explanation. I understand the steps you are taking but I am missing a lot of knowledge to understand what is going on. Whats should I know before fully comprehending SHA functions? Should I learn binary/bit wise operations/programming? I'll rewatch a couple of times but as a noob to this, I think this is too advanced for me yet. What can I learn to make this easier to understand? Thanks!

  • @Strasbourgeois
    @Strasbourgeois Год назад

    9:14 what's the reason of adding 1 at step 4

  • @omarshoura6327
    @omarshoura6327 6 лет назад +4

    So I don’t know if I’m understanding it wrong but the purpose of a hash function might be to verify that a message hasn’t been corrupted.
    That is down by hashing the message then sending the hash result along with it and the way the receiver checks it is by hashing the message and see if it matches?
    Ok then so how come a hacker won’t just also change the hash output so that it seems like nothing has been hacked.
    And if you check it against the hash that the sender stored then in sending that hash to the receiver to verify it, couldn’t a hacker change that too?
    Please explain this to me.

    • @nIrUbU01
      @nIrUbU01 6 лет назад +1

      You dont send both in the same message/at the same time.
      To be really safe youd have to use 2 different "methods of communication" I guess, like E-Mail and regular offline mail or telephone.

    • @vickybhorjar2111
      @vickybhorjar2111 4 года назад

      The Hash value can be encrypted using a shared secret key and when the message is received the hash value is decrypted and then checked. This way the hash value cannot be changed

  • @DoctorSantosh
    @DoctorSantosh 3 года назад +8

    Too bad the most important part (step 11) didn't contain any detailed information other than the sentence "a bunch of xor". Thanks God we have the screenshot of his code !

  • @christymathew9035
    @christymathew9035 5 лет назад

    way more than EXCELLENT .LOVED IT. :)

  • @manipal2011
    @manipal2011 6 лет назад +4

    In Hashing (encryption is done but decryption is not possible)

    • @tanishqkumar1640
      @tanishqkumar1640 4 года назад

      Nothing is impossible it may look now not possible but maybe after 100 years it is nothing

    • @hakamkoubaa7827
      @hakamkoubaa7827 4 года назад

      @@tanishqkumar1640 I doubt it will take 100 years more like 5 years or 10 with quantum computing

  • @darkzero4608
    @darkzero4608 5 лет назад

    At Step 7: it is 64 Bits as you show 64 bit padding zeros in front.
    Step 8: Do we need to append to 64 bit to binary msg 512 bit(both msg + array length 64bit) or
    step 5 is already 512 bit and added 64 bit length gives 512+ 64 = 578.
    Which one is correct? Confused!

    • @bopon4090
      @bopon4090 5 лет назад

      actually in step 5 the length of (padding zero and binary data )is 448

  • @supremebohnenstange4102
    @supremebohnenstange4102 3 года назад

    Maybe explain the actual interesting bits like step 13 and not the pre proccesing

  • @fmartin59
    @fmartin59 5 лет назад +3

    There's a siren sound in the video.
    I thought it was from windows lol

  • @akhiljupalli3110
    @akhiljupalli3110 3 года назад

    At step-6. how did we get 48 from step 3

    • @d.j.peters
      @d.j.peters 3 года назад

      input was '"A Test" 6 chars * 8 bits = 48 bits

  • @ro-ce8vg
    @ro-ce8vg 3 года назад +1

    the explanation of the actually complicated part was too short imo

  • @ameyresa3277
    @ameyresa3277 6 лет назад

    why in step 4 you add 1? is that necessary?

  • @pavankumarmp5331
    @pavankumarmp5331 6 лет назад

    Super Video sir :)

  • @ahsanmurad9677
    @ahsanmurad9677 3 года назад +3

    I think there are some issues with this! you are running a nested loop. and getting words[i][j], j is running until 80, since each word is 32 bit long, this should return a segmentation fault!

  • @mauriciosanchez813
    @mauriciosanchez813 6 лет назад

    thank U amigo!

  • @WahranRai
    @WahranRai 11 месяцев назад

    Could you go faster than that ?

  • @aymanmakhoukhi3591
    @aymanmakhoukhi3591 4 года назад

    would you please send me this code I need it for my presentation

  • @ArashZandi20
    @ArashZandi20 3 года назад

    I didn't realize since part 11

  • @dangagich2689
    @dangagich2689 5 лет назад +2

    Woop-woop! That's the sound of da police!

  • @iaashu98
    @iaashu98 5 лет назад +1

    someone, please snatch those horrible siren sounding in the background.

  • @alexjunquera8629
    @alexjunquera8629 7 лет назад +3

    dragons

  • @-_lIl_-
    @-_lIl_- Год назад

    "the entire text of the bible" 💀

  • @sohangchopra6478
    @sohangchopra6478 3 года назад

    after watching this video, I still don't really understand how SHA-1 works. so.... not good!

  • @Kk-co2gh
    @Kk-co2gh 3 года назад

    Step 11 makes no sense

  • @stfbrasil1989
    @stfbrasil1989 2 года назад

    Im not undertanding

  • @eula9
    @eula9 3 года назад

    seriously? 9 mins to actually start saying something of value?

    • @d.j.peters
      @d.j.peters 3 года назад

      No j runs from 0 to 79 it's correct (minutes ago I tested the code presented in the clip)