🔥IITK - Professional Certificate Program in Blockchain (India Only) - www.simplilearn.com/blockchain-certification-training-course?UEHrK_4&Comments&RUclips
You can't say that the hashing function should meet a requirement for the attacker to be impossible to create 2 messages producing exactly the same hash. By design there are infinite number of messages that will produce the same hash. That's basically base rule of hashing. The size of the hash determines how hard it is to find at least 2. That's why with todays computing power it's almost impossible to find multiple inputs that would produce the same hash, but in theory that's absolutely possible.
Thank you for the appreciation. You can check our videos related to various technologies and subscribe to our channel to stay updated with all the trending technologies.
Thank you for choosing us as your learning partner. We are thrilled to hear that you enjoyed your experience with us! If you are looking to expand your knowledge further, we invite you to explore our other courses in the description box.
How does the length of the original message become 64 bits? Why do we append a 1bit followed by zeroes? What does the length of message mean? (Is it the number of characters or the size of the message in bits) ?
Everything is so good but bro this is not the working of SHA 256 its all about SHA 1 why are you guys misleading students i was so happy with the content build up my concepts and make all the possible way out and write a code in python and in the end i end i got to know that its all about sha 1 not about sha 256
Thank you for the appreciation. You can check our videos related to various technologies and subscribe to our channel to stay updated with all the trending technologies.
🔥IITK - Professional Certificate Program in Blockchain (India Only) - www.simplilearn.com/blockchain-certification-training-course?UEHrK_4&Comments&RUclips
You can't say that the hashing function should meet a requirement for the attacker to be impossible to create 2 messages producing exactly the same hash. By design there are infinite number of messages that will produce the same hash. That's basically base rule of hashing. The size of the hash determines how hard it is to find at least 2. That's why with todays computing power it's almost impossible to find multiple inputs that would produce the same hash, but in theory that's absolutely possible.
Thanks for watching our video and sharing your thoughts. Do subscribe to our channel and stay tuned for more. Cheers!
The theory explanation is good. I think it will be register better me for me with a hands-on implementation.
Thank you for the appreciation. You can check our videos related to various technologies and subscribe to our channel to stay updated with all the trending technologies.
I agree. The explanation is good but I couldn't visualize.
Graphics and presentation were very good. Even for a relative novice like me. Thanks.
Thank you for choosing us as your learning partner. We are thrilled to hear that you enjoyed your experience with us! If you are looking to expand your knowledge further, we invite you to explore our other courses in the description box.
How does the length of the original message become 64 bits?
Why do we append a 1bit followed by zeroes?
What does the length of message mean? (Is it the number of characters or the size of the message in bits) ?
Everything is so good but bro this is not the working of SHA 256 its all about SHA 1 why are you guys misleading students i was so happy with the content build up my concepts and make all the possible way out and write a code in python and in the end i end i got to know that its all about sha 1 not about sha 256
Can we use hashing on data given by users through input fields that get stored in a database ? If so which hashing algorithm is more effective
Good Video with easy explanation to understand
Glad it was helpful!
Excellent video, now I understand it! Very well explained. 😊👍
Thank you for the appreciation. You can check our videos related to various technologies and subscribe to our channel to stay updated with all the trending technologies.
What does XOR mean?
the y do we get different outputs(hashes for the same string using the same algorithm) when implemented practically ?
8:04 is padding done in left or right to the original message?
Can we get this PPT
Has a collision ever been found?