SHA 256 | SHA 256 Algorithm Explanation | How SHA 256 Algorithm Works | Cryptography | Simplilearn

Поделиться
HTML-код
  • Опубликовано: 12 сен 2024

Комментарии • 21

  • @SimplilearnOfficial
    @SimplilearnOfficial  3 года назад +8

    🔥IITK - Professional Certificate Program in Blockchain (India Only) - www.simplilearn.com/blockchain-certification-training-course?UEHrK_4&Comments&RUclips

  • @KamilKuliczkowski
    @KamilKuliczkowski 2 года назад +44

    You can't say that the hashing function should meet a requirement for the attacker to be impossible to create 2 messages producing exactly the same hash. By design there are infinite number of messages that will produce the same hash. That's basically base rule of hashing. The size of the hash determines how hard it is to find at least 2. That's why with todays computing power it's almost impossible to find multiple inputs that would produce the same hash, but in theory that's absolutely possible.

    • @SimplilearnOfficial
      @SimplilearnOfficial  2 года назад +8

      Thanks for watching our video and sharing your thoughts. Do subscribe to our channel and stay tuned for more. Cheers!

  • @theotherside7504
    @theotherside7504 3 года назад +6

    The theory explanation is good. I think it will be register better me for me with a hands-on implementation.

    • @SimplilearnOfficial
      @SimplilearnOfficial  3 года назад

      Thank you for the appreciation. You can check our videos related to various technologies and subscribe to our channel to stay updated with all the trending technologies.

    • @caeestevao
      @caeestevao 2 года назад +2

      I agree. The explanation is good but I couldn't visualize.

  • @pauldavis9303
    @pauldavis9303 Год назад +2

    Graphics and presentation were very good. Even for a relative novice like me. Thanks.

    • @SimplilearnOfficial
      @SimplilearnOfficial  Год назад

      Thank you for choosing us as your learning partner. We are thrilled to hear that you enjoyed your experience with us! If you are looking to expand your knowledge further, we invite you to explore our other courses in the description box.

  • @vishmaychauhan2863
    @vishmaychauhan2863 2 года назад +4

    How does the length of the original message become 64 bits?
    Why do we append a 1bit followed by zeroes?
    What does the length of message mean? (Is it the number of characters or the size of the message in bits) ?

  • @user-cr5rs1eq4k
    @user-cr5rs1eq4k 9 месяцев назад +4

    Everything is so good but bro this is not the working of SHA 256 its all about SHA 1 why are you guys misleading students i was so happy with the content build up my concepts and make all the possible way out and write a code in python and in the end i end i got to know that its all about sha 1 not about sha 256

  • @bhoomikakr7545
    @bhoomikakr7545 Год назад +2

    Can we use hashing on data given by users through input fields that get stored in a database ? If so which hashing algorithm is more effective

  • @raksabb
    @raksabb 2 года назад +3

    Good Video with easy explanation to understand

  • @peppermann
    @peppermann 3 года назад +7

    Excellent video, now I understand it! Very well explained. 😊👍

    • @SimplilearnOfficial
      @SimplilearnOfficial  3 года назад +1

      Thank you for the appreciation. You can check our videos related to various technologies and subscribe to our channel to stay updated with all the trending technologies.

  • @jerryspynx54
    @jerryspynx54 2 года назад +2

    What does XOR mean?

  • @tejasakumar7428
    @tejasakumar7428 Год назад

    the y do we get different outputs(hashes for the same string using the same algorithm) when implemented practically ?

  • @ChandanSah-un2xg
    @ChandanSah-un2xg 11 месяцев назад

    8:04 is padding done in left or right to the original message?

  • @dharmeshshrivastava6714
    @dharmeshshrivastava6714 Год назад

    Can we get this PPT

  • @whatthefunction9140
    @whatthefunction9140 3 года назад

    Has a collision ever been found?