How hash function work?

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hello this is sunny welcome back today my topic is hash algorithm hash function or hash algorithm creates a unique digital fingerprint with data the detail fingerprint of the data is called digest or message digest or simply hash hash algorithm is primarily used for comparison purpose not for encryption many secure hash algorithms have three basic characteristics one secure resulting hash or digest cannot be reversed to determine original data hash algorithm is not reversible is one-way function giving a digest you cannot get the original data to fix the size giving a hash algorithm you will get fixed size digests no matter how original data vary in length short or long data sets will produce the same size digest three unique to different data sets cannot produce the same digest hash algorithm is commonly used for passwords take a Twitter as an example today I want to see what's going on with a Donald Trump I needed to log in first my username Sammy saw my password abc123 when I click Submit both my username and password would be sent to Twitter database while the before map password is a sent to the database it is a hashed to a digest let's assume Twitter use sha-256 as Thea has algorithm they my password digest would be 256 bit long you might say hey your password is too easy is it too risky you are right how about I love you princess the Lummi is not a good password either but for the sake of learning is okay at this moment a new password a new digest of course but the digester size is a still 256 bit alarm therefore the same hash algorithm always produces the same sized digests keep in mind all password in Twitter database or any secure database are stored in a forum our deities they should never be stored in plain text in any database every time you log in your password is hashed into a digest which is then compared against the one stored in a database that's why we see hash algorithm is mainly used for comparison purpose not for encryption you might say the hash algorithm is not reversible and our transferred are is stored in a database in the form of dodges but why our password I still have to well to find out why is another story in another video thank you very much and see you next time [Music]
Info
Channel: Sunny Classroom
Views: 128,899
Rating: 4.8987551 out of 5
Keywords: sunny sun sunnysunkansas, sunnyclassroom, networking, networking+, security+, sunny sun, sunny classroom, cybersecurity, cyber defense and attacks, hashing functions, hashing, hash, digests, password protection, password management, password weakness
Id: xsp--srKWKw
Channel Id: undefined
Length: 4min 29sec (269 seconds)
Published: Sat Jun 17 2017
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.