How Does SHA-1 Work - Intro to Cryptographic Hash Functions and SHA-1

  Рет қаралды 62,206

Fullstack Academy

Fullstack Academy

Күн бұрын

Learn more advanced front-end and full-stack development at: www.fullstackacademy.com
SHA-1 stands for Secure Hash Algorithm 1, a cryptographic hash function developed by the NSA that can be used to verify that a file has been unaltered. In this video, we go over the basic features and common implementations of cryptographic hash functions before diving into the inner workings of a Javascript implementation of the SHA-1 function. Although out of use now, walking through the hash function code provides valuable insight into how these algorithms work.
Watch this video to learn:
- What are Cryptographic Hash Functions
- Practical uses for Cryptographic Hash Functions
- How does SHA-1 work

Пікірлер: 59
@akshaysalunke13
@akshaysalunke13 4 жыл бұрын
SHA1 Explanation starts: (8:08)
@johnny2dabz
@johnny2dabz 6 жыл бұрын
Best I've seen so far. Nice work.
@N1ghtR1der666
@N1ghtR1der666 4 жыл бұрын
initialize some variables... umm wat? what happened to explain things? in-fact after this point the whole explanation went out the window for most following steps
@spearchew
@spearchew 2 жыл бұрын
lol
@ruchamathure
@ruchamathure 5 жыл бұрын
This was so helpful! I have to give a presentation (which I totally forgot about till today) on SHA-1 to my entire uni class & professor tomorrow and didn't know anything about it, but this video was so comprehensive, even to the uninitiated that I feel quite confident now!
@user-km6hc3ez6o
@user-km6hc3ez6o 2 жыл бұрын
How did your presentation go? :)
@ruchamathure
@ruchamathure 2 жыл бұрын
@@user-km6hc3ez6o It went great! Thanks for asking :)
@kareemsharawi4778
@kareemsharawi4778 5 жыл бұрын
It truly was a "great presentation Sam" :-) Thanks a lot!
@madfangkills
@madfangkills Жыл бұрын
Definitely loved you walking through the algorithm. It's so much better breaking it down into understandable chunks
@DoctorSantosh
@DoctorSantosh 3 жыл бұрын
Too bad the most important part (step 11) didn't contain any detailed information other than the sentence "a bunch of xor". Thanks God we have the screenshot of his code !
@bryandussanjimenez3316
@bryandussanjimenez3316 4 жыл бұрын
Wo, this is what I was looking for a long time, appreciate your job, thanks
@nadzeyahutsko1094
@nadzeyahutsko1094 3 жыл бұрын
The explanation is wonderful!
@wilsonbalderrama
@wilsonbalderrama 6 жыл бұрын
amazing this explanation is the best one I've seen, kudos to the presenter
@tymothylim6550
@tymothylim6550 3 жыл бұрын
Thank you very much for this video! Really interesting and educational! :)
@christymathew9035
@christymathew9035 4 жыл бұрын
way more than EXCELLENT .LOVED IT. :)
@starkxz
@starkxz 2 жыл бұрын
Thanks Sam. That was really a great presentation 👍🏻
@machinelearningid3931
@machinelearningid3931 3 жыл бұрын
Thanks, this is most concise explanation in the youtube
@alejandroamoros5339
@alejandroamoros5339 2 жыл бұрын
Wow what a great video and a great explanation. I understand the steps you are taking but I am missing a lot of knowledge to understand what is going on. Whats should I know before fully comprehending SHA functions? Should I learn binary/bit wise operations/programming? I'll rewatch a couple of times but as a noob to this, I think this is too advanced for me yet. What can I learn to make this easier to understand? Thanks!
@adrianpilikser2195
@adrianpilikser2195 2 жыл бұрын
Although the video is really helpful and explains everything in great detail, I have to add that the shown h and k values are fundamentally different to those used in practice, thus producing completely different results. But otherwise it is a wonderful lesson dives deep in the workings of the SHA1 algorithm.
@TheCTMcG
@TheCTMcG 5 жыл бұрын
I didn't follow your reasoning on the 448 aspect of 512 mod 448. shouldn't it be mod 512 == 0 ?
@darkzero4608
@darkzero4608 5 жыл бұрын
Yeah (512 MOD 448) is 64. and reverse way (448 MOD 512) is 448. So Right thing is i feeel (448 MOD 512) as later padding 64 bit length of array length gives 512 bit total length.
@TkiDeneb
@TkiDeneb 5 жыл бұрын
@@darkzero4608 Yes you're right
@swamysriman7147
@swamysriman7147 3 жыл бұрын
9:52 Isn't that 448 mod 512?
@altairezio6850
@altairezio6850 3 жыл бұрын
Yup. I caught that too. He might have accidently swapped them.
@Strasbourgeois
@Strasbourgeois Жыл бұрын
9:14 what's the reason of adding 1 at step 4
@pavankumarmp5331
@pavankumarmp5331 6 жыл бұрын
Super Video sir :)
@darkzero4608
@darkzero4608 5 жыл бұрын
At Step 7: it is 64 Bits as you show 64 bit padding zeros in front. Step 8: Do we need to append to 64 bit to binary msg 512 bit(both msg + array length 64bit) or step 5 is already 512 bit and added 64 bit length gives 512+ 64 = 578. Which one is correct? Confused!
@bipinmaharjan4090
@bipinmaharjan4090 5 жыл бұрын
actually in step 5 the length of (padding zero and binary data )is 448
@mauriciosanchez813
@mauriciosanchez813 5 жыл бұрын
thank U amigo!
@zNeoDev
@zNeoDev 6 жыл бұрын
I don't get the step 11 in how sha-1 works :/
@ameyresa3277
@ameyresa3277 5 жыл бұрын
why in step 4 you add 1? is that necessary?
@TheMetalhead1311
@TheMetalhead1311 4 жыл бұрын
Two's complement. Yes its necessary.
@manipal2011
@manipal2011 5 жыл бұрын
In Hashing (encryption is done but decryption is not possible)
@tanishqkumar1640
@tanishqkumar1640 4 жыл бұрын
Nothing is impossible it may look now not possible but maybe after 100 years it is nothing
@hakamkoubaa7827
@hakamkoubaa7827 3 жыл бұрын
@@tanishqkumar1640 I doubt it will take 100 years more like 5 years or 10 with quantum computing
@omarshoura6327
@omarshoura6327 6 жыл бұрын
So I don’t know if I’m understanding it wrong but the purpose of a hash function might be to verify that a message hasn’t been corrupted. That is down by hashing the message then sending the hash result along with it and the way the receiver checks it is by hashing the message and see if it matches? Ok then so how come a hacker won’t just also change the hash output so that it seems like nothing has been hacked. And if you check it against the hash that the sender stored then in sending that hash to the receiver to verify it, couldn’t a hacker change that too? Please explain this to me.
@nIrUbU01
@nIrUbU01 6 жыл бұрын
You dont send both in the same message/at the same time. To be really safe youd have to use 2 different "methods of communication" I guess, like E-Mail and regular offline mail or telephone.
@vickybhorjar2111
@vickybhorjar2111 4 жыл бұрын
The Hash value can be encrypted using a shared secret key and when the message is received the hash value is decrypted and then checked. This way the hash value cannot be changed
@fmartin59
@fmartin59 5 жыл бұрын
There's a siren sound in the video. I thought it was from windows lol
@akhiljupalli3110
@akhiljupalli3110 2 жыл бұрын
At step-6. how did we get 48 from step 3
@d.j.peters
@d.j.peters 2 жыл бұрын
input was '"A Test" 6 chars * 8 bits = 48 bits
@supremebohnenstange4102
@supremebohnenstange4102 3 жыл бұрын
Maybe explain the actual interesting bits like step 13 and not the pre proccesing
@aymanmakhoukhi3591
@aymanmakhoukhi3591 4 жыл бұрын
would you please send me this code I need it for my presentation
@ArashZandi20
@ArashZandi20 3 жыл бұрын
I didn't realize since part 11
@ro-ce8vg
@ro-ce8vg 2 жыл бұрын
the explanation of the actually complicated part was too short imo
@dangagich2689
@dangagich2689 4 жыл бұрын
Woop-woop! That's the sound of da police!
@WahranRai
@WahranRai 7 ай бұрын
Could you go faster than that ?
@ahsanmurad9677
@ahsanmurad9677 3 жыл бұрын
I think there are some issues with this! you are running a nested loop. and getting words[i][j], j is running until 80, since each word is 32 bit long, this should return a segmentation fault!
@alexjunquera8629
@alexjunquera8629 7 жыл бұрын
dragons
@anthonyrobertson846
@anthonyrobertson846 6 жыл бұрын
yes
@iaashu98
@iaashu98 5 жыл бұрын
someone, please snatch those horrible siren sounding in the background.
@-_lIl_-
@-_lIl_- 10 ай бұрын
"the entire text of the bible" 💀
@sohangchopra6478
@sohangchopra6478 3 жыл бұрын
after watching this video, I still don't really understand how SHA-1 works. so.... not good!
@Kk-co2gh
@Kk-co2gh 3 жыл бұрын
Step 11 makes no sense
@stfbrasil1989
@stfbrasil1989 2 жыл бұрын
Im not undertanding
@eula9
@eula9 2 жыл бұрын
seriously? 9 mins to actually start saying something of value?
@d.j.peters
@d.j.peters 2 жыл бұрын
No j runs from 0 to 79 it's correct (minutes ago I tested the code presented in the clip)
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
The delivery rescued them
00:52
Mamasoboliha
Рет қаралды 7 МЛН
How I prepare to meet the brothers Mbappé.. 🙈 @KylianMbappe
00:17
Celine Dept
Рет қаралды 59 МЛН
I Need Your Help..
00:33
Stokes Twins
Рет қаралды 156 МЛН
Заметили?
00:11
Double Bubble
Рет қаралды 3,3 МЛН
Some Advice on Using Jupyter Notebook for Beginner to Master
2:18
Hashing Algorithms and Security - Computerphile
8:12
Computerphile
Рет қаралды 1,5 МЛН
The unsolved math problem which could be worth a billion dollars.
5:59
Matthew Weathers
Рет қаралды 2,4 МЛН
Faster than Rust and C++: the PERFECT hash table
33:52
strager
Рет қаралды 513 М.
Git Internals -  How Git Works - Fear Not The SHA!
31:23
GitLab
Рет қаралды 115 М.
Intro to Digital Certificates
21:47
Dave Crabbe
Рет қаралды 424 М.
Passwords & hash functions (Simply Explained)
7:28
Simply Explained
Рет қаралды 364 М.
Hashing vs Encryption Differences
19:38
Programming w/ Professor Sluiter
Рет қаралды 161 М.
But how does bitcoin actually work?
25:16
3Blue1Brown
Рет қаралды 15 МЛН
ПК с Авито за 3000р
0:58
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 1,8 МЛН
Will the battery emit smoke if it rotates rapidly?
0:11
Meaningful Cartoons 183
Рет қаралды 4,3 МЛН
Индуктивность и дроссель.
1:00
Hi Dev! – Электроника
Рет қаралды 1,6 МЛН
Pratik Cat6 kablo soyma
0:15
Elektrik-Elektronik
Рет қаралды 8 МЛН