Hashing Algorithms and Security - Computerphile

Computerphile · Intermediate ·📐 ML Fundamentals ·12y ago
Audible free book: http://www.audible.com/computerphile Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out. More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Pigeon Sound Effects courtesy of http://www.freesfx.co.uk/ Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradych…
Watch on YouTube ↗ (saves to browser)

Playlist

Uploads from Computerphile · Computerphile · 52 of 60

1 Welcome to Computerphile!
Welcome to Computerphile!
Computerphile
2 Homemade Video Arcade Machine - Computerphile
Homemade Video Arcade Machine - Computerphile
Computerphile
3 Follow the Cookie Trail - Computerphile
Follow the Cookie Trail - Computerphile
Computerphile
4 EXTRA BITS - Follow the Cookie Trail - Computerphile
EXTRA BITS - Follow the Cookie Trail - Computerphile
Computerphile
5 Musical Floppy Drives - Computerphile
Musical Floppy Drives - Computerphile
Computerphile
6 The Hair Algorithm - Computerphile
The Hair Algorithm - Computerphile
Computerphile
7 The Art of Abstraction - Computerphile
The Art of Abstraction - Computerphile
Computerphile
8 Email - Computerphile
Email - Computerphile
Computerphile
9 Raspberry Pi Hardware - Computerphile
Raspberry Pi Hardware - Computerphile
Computerphile
10 Near to the Metal - Computerphile
Near to the Metal - Computerphile
Computerphile
11 BBC B Microcomputer - Computerphile
BBC B Microcomputer - Computerphile
Computerphile
12 Getting Sorted & Big O Notation - Computerphile
Getting Sorted & Big O Notation - Computerphile
Computerphile
13 Compression - Computerphile
Compression - Computerphile
Computerphile
14 Quick Sort - Computerphile
Quick Sort - Computerphile
Computerphile
15 Hyper History and Cyber War - Computerphile
Hyper History and Cyber War - Computerphile
Computerphile
16 Entropy in Compression - Computerphile
Entropy in Compression - Computerphile
Computerphile
17 Original Elite on the BBC B - Computerphile
Original Elite on the BBC B - Computerphile
Computerphile
18 Network Stacks and the Internet - Computerphile
Network Stacks and the Internet - Computerphile
Computerphile
19 Circuit Board Building Robot - Computerphile
Circuit Board Building Robot - Computerphile
Computerphile
20 Mainframes and the Unix Revolution - Computerphile
Mainframes and the Unix Revolution - Computerphile
Computerphile
21 IP Addresses and the Internet - Computerphile
IP Addresses and the Internet - Computerphile
Computerphile
22 A Career in Video Games - Computerphile
A Career in Video Games - Computerphile
Computerphile
23 Error Detection and Flipping the Bits - Computerphile
Error Detection and Flipping the Bits - Computerphile
Computerphile
24 Programming BASIC and Sorting - Computerphile
Programming BASIC and Sorting - Computerphile
Computerphile
25 What if the Universe is a Computer Simulation? - Computerphile
What if the Universe is a Computer Simulation? - Computerphile
Computerphile
26 Birthplace of the World Wide Web - Computerphile
Birthplace of the World Wide Web - Computerphile
Computerphile
27 Punch Card Programming - Computerphile
Punch Card Programming - Computerphile
Computerphile
28 EXTRA BITS - More about Punch Cards - Computerphile
EXTRA BITS - More about Punch Cards - Computerphile
Computerphile
29 EXTRA BITS - Behind the scenes on Computerphile - Computerphile
EXTRA BITS - Behind the scenes on Computerphile - Computerphile
Computerphile
30 Network Address Translation - Computerphile
Network Address Translation - Computerphile
Computerphile
31 Programming Paradigms - Computerphile
Programming Paradigms - Computerphile
Computerphile
32 CERN Computing Centre (and mouse farm) - Computerphile
CERN Computing Centre (and mouse farm) - Computerphile
Computerphile
33 Error Correction - Computerphile
Error Correction - Computerphile
Computerphile
34 Home-Made Code - Computerphile
Home-Made Code - Computerphile
Computerphile
35 Security of Data on Disk - Computerphile
Security of Data on Disk - Computerphile
Computerphile
36 Characters, Symbols and the Unicode Miracle - Computerphile
Characters, Symbols and the Unicode Miracle - Computerphile
Computerphile
37 Gesture Controls - Computerphile
Gesture Controls - Computerphile
Computerphile
38 How Intelligent is Artificial Intelligence? - Computerphile
How Intelligent is Artificial Intelligence? - Computerphile
Computerphile
39 EXTRA BITS - UTF-8 'nearly' works - Computerphile
EXTRA BITS - UTF-8 'nearly' works - Computerphile
Computerphile
40 Encryption and Security Agencies - Computerphile
Encryption and Security Agencies - Computerphile
Computerphile
41 Virtual Machines Power the Cloud - Computerphile
Virtual Machines Power the Cloud - Computerphile
Computerphile
42 EXTRA BITS - Data Security and Flash Memory - Computerphile
EXTRA BITS - Data Security and Flash Memory - Computerphile
Computerphile
43 Hacking Websites with SQL Injection - Computerphile
Hacking Websites with SQL Injection - Computerphile
Computerphile
44 The Grid, CERN's Global Supercomputer - Computerphile
The Grid, CERN's Global Supercomputer - Computerphile
Computerphile
45 How Huffman Trees Work - Computerphile
How Huffman Trees Work - Computerphile
Computerphile
46 EXTRA BITS/TRITS - Huffman Trees - Computerphile
EXTRA BITS/TRITS - Huffman Trees - Computerphile
Computerphile
47 Cracking Websites with Cross Site Scripting - Computerphile
Cracking Websites with Cross Site Scripting - Computerphile
Computerphile
48 Cloud Computing (Cloudy with a Chance of Pizza) - Computerphile
Cloud Computing (Cloudy with a Chance of Pizza) - Computerphile
Computerphile
49 Elegant Compression in Text (The LZ 77 Method) - Computerphile
Elegant Compression in Text (The LZ 77 Method) - Computerphile
Computerphile
50 EXTRA BITS - Text Compression Meets Probabilities - Computerphile
EXTRA BITS - Text Compression Meets Probabilities - Computerphile
Computerphile
51 Texting Cabbage with a Recorder - Computerphile
Texting Cabbage with a Recorder - Computerphile
Computerphile
Hashing Algorithms and Security - Computerphile
Hashing Algorithms and Security - Computerphile
Computerphile
53 How YouTube Works - Computerphile
How YouTube Works - Computerphile
Computerphile
54 How NOT to Store Passwords! - Computerphile
How NOT to Store Passwords! - Computerphile
Computerphile
55 A New Golden Age of Video Games - Computerphile
A New Golden Age of Video Games - Computerphile
Computerphile
56 A Universe of Triangles - Computerphile
A Universe of Triangles - Computerphile
Computerphile
57 Cross Site Request Forgery - Computerphile
Cross Site Request Forgery - Computerphile
Computerphile
58 The True Power of the Matrix (Transformations in Graphics) - Computerphile
The True Power of the Matrix (Transformations in Graphics) - Computerphile
Computerphile
59 The Great 202 Jailbreak - Computerphile
The Great 202 Jailbreak - Computerphile
Computerphile
60 EXTRA BITS - Printing and Typesetting History - Computerphile
EXTRA BITS - Printing and Typesetting History - Computerphile
Computerphile
The NEW wave of engineering 🤔
Next Up
The NEW wave of engineering 🤔
Sajjaad Khader