How Does SHA-1 Work - Intro to Cryptographic Hash Functions and SHA-1

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 ก.ย. 2024

ความคิดเห็น • 59

  • @ruchamathure
    @ruchamathure 6 ปีที่แล้ว +21

    This was so helpful! I have to give a presentation (which I totally forgot about till today) on SHA-1 to my entire uni class & professor tomorrow and didn't know anything about it, but this video was so comprehensive, even to the uninitiated that I feel quite confident now!

    • @user-km6hc3ez6o
      @user-km6hc3ez6o 3 ปีที่แล้ว +1

      How did your presentation go? :)

    • @ruchamathure
      @ruchamathure 3 ปีที่แล้ว +6

      @@user-km6hc3ez6o It went great! Thanks for asking :)

  • @akshaysalunke13
    @akshaysalunke13 5 ปีที่แล้ว +60

    SHA1 Explanation starts: (8:08)

  • @N1ghtR1der666
    @N1ghtR1der666 4 ปีที่แล้ว +23

    initialize some variables... umm wat? what happened to explain things? in-fact after this point the whole explanation went out the window for most following steps

  • @DoctorSantosh
    @DoctorSantosh 3 ปีที่แล้ว +8

    Too bad the most important part (step 11) didn't contain any detailed information other than the sentence "a bunch of xor". Thanks God we have the screenshot of his code !

  • @madfangkills
    @madfangkills ปีที่แล้ว

    Definitely loved you walking through the algorithm. It's so much better breaking it down into understandable chunks

  • @johnny2dabz
    @johnny2dabz 6 ปีที่แล้ว +11

    Best I've seen so far. Nice work.

  • @adrianpilikser2195
    @adrianpilikser2195 2 ปีที่แล้ว +1

    Although the video is really helpful and explains everything in great detail, I have to add that the shown h and k values are fundamentally different to those used in practice, thus producing completely different results.
    But otherwise it is a wonderful lesson dives deep in the workings of the SHA1 algorithm.

  • @kareemsharawi4778
    @kareemsharawi4778 5 ปีที่แล้ว +4

    It truly was a "great presentation Sam" :-) Thanks a lot!

  • @machinelearningid3931
    @machinelearningid3931 3 ปีที่แล้ว

    Thanks, this is most concise explanation in the youtube

  • @bryandussanjimenez3316
    @bryandussanjimenez3316 4 ปีที่แล้ว +1

    Wo, this is what I was looking for a long time, appreciate your job, thanks

  • @TheCTMcG
    @TheCTMcG 5 ปีที่แล้ว +5

    I didn't follow your reasoning on the 448 aspect of 512 mod 448. shouldn't it be mod 512 == 0 ?

    • @darkzero4608
      @darkzero4608 5 ปีที่แล้ว +5

      Yeah (512 MOD 448) is 64. and reverse way (448 MOD 512) is 448.
      So Right thing is i feeel (448 MOD 512) as later padding 64 bit length of array length gives 512 bit total length.

    • @TkiDeneb
      @TkiDeneb 5 ปีที่แล้ว +1

      @@darkzero4608 Yes you're right

  • @starkxz
    @starkxz 2 ปีที่แล้ว

    Thanks Sam. That was really a great presentation 👍🏻

  • @swamysriman7147
    @swamysriman7147 4 ปีที่แล้ว +6

    9:52
    Isn't that 448 mod 512?

    • @altairezio6850
      @altairezio6850 3 ปีที่แล้ว +3

      Yup. I caught that too. He might have accidently swapped them.

  • @nadzeyahutsko1094
    @nadzeyahutsko1094 3 ปีที่แล้ว

    The explanation is wonderful!

  • @wilsonbalderrama
    @wilsonbalderrama 6 ปีที่แล้ว

    amazing this explanation is the best one I've seen, kudos to the presenter

  • @tymothylim6550
    @tymothylim6550 3 ปีที่แล้ว

    Thank you very much for this video! Really interesting and educational! :)

  • @alejandroamoros5339
    @alejandroamoros5339 2 ปีที่แล้ว

    Wow what a great video and a great explanation. I understand the steps you are taking but I am missing a lot of knowledge to understand what is going on. Whats should I know before fully comprehending SHA functions? Should I learn binary/bit wise operations/programming? I'll rewatch a couple of times but as a noob to this, I think this is too advanced for me yet. What can I learn to make this easier to understand? Thanks!

  • @christymathew9035
    @christymathew9035 5 ปีที่แล้ว

    way more than EXCELLENT .LOVED IT. :)

  • @zNeoDev
    @zNeoDev 6 ปีที่แล้ว +5

    I don't get the step 11 in how sha-1 works :/

  • @manipal2011
    @manipal2011 6 ปีที่แล้ว +4

    In Hashing (encryption is done but decryption is not possible)

    • @tanishqkumar1640
      @tanishqkumar1640 4 ปีที่แล้ว

      Nothing is impossible it may look now not possible but maybe after 100 years it is nothing

    • @hakamkoubaa7827
      @hakamkoubaa7827 4 ปีที่แล้ว

      @@tanishqkumar1640 I doubt it will take 100 years more like 5 years or 10 with quantum computing

  • @Strasbourgeois
    @Strasbourgeois ปีที่แล้ว

    9:14 what's the reason of adding 1 at step 4

  • @omarshoura6327
    @omarshoura6327 6 ปีที่แล้ว +4

    So I don’t know if I’m understanding it wrong but the purpose of a hash function might be to verify that a message hasn’t been corrupted.
    That is down by hashing the message then sending the hash result along with it and the way the receiver checks it is by hashing the message and see if it matches?
    Ok then so how come a hacker won’t just also change the hash output so that it seems like nothing has been hacked.
    And if you check it against the hash that the sender stored then in sending that hash to the receiver to verify it, couldn’t a hacker change that too?
    Please explain this to me.

    • @nIrUbU01
      @nIrUbU01 6 ปีที่แล้ว +1

      You dont send both in the same message/at the same time.
      To be really safe youd have to use 2 different "methods of communication" I guess, like E-Mail and regular offline mail or telephone.

    • @vickybhorjar2111
      @vickybhorjar2111 4 ปีที่แล้ว

      The Hash value can be encrypted using a shared secret key and when the message is received the hash value is decrypted and then checked. This way the hash value cannot be changed

  • @fmartin59
    @fmartin59 5 ปีที่แล้ว +3

    There's a siren sound in the video.
    I thought it was from windows lol

  • @supremebohnenstange4102
    @supremebohnenstange4102 3 ปีที่แล้ว

    Maybe explain the actual interesting bits like step 13 and not the pre proccesing

  • @pavankumarmp5331
    @pavankumarmp5331 6 ปีที่แล้ว

    Super Video sir :)

  • @ro-ce8vg
    @ro-ce8vg 3 ปีที่แล้ว +1

    the explanation of the actually complicated part was too short imo

  • @darkzero4608
    @darkzero4608 5 ปีที่แล้ว

    At Step 7: it is 64 Bits as you show 64 bit padding zeros in front.
    Step 8: Do we need to append to 64 bit to binary msg 512 bit(both msg + array length 64bit) or
    step 5 is already 512 bit and added 64 bit length gives 512+ 64 = 578.
    Which one is correct? Confused!

    • @bopon4090
      @bopon4090 5 ปีที่แล้ว

      actually in step 5 the length of (padding zero and binary data )is 448

  • @mauriciosanchez813
    @mauriciosanchez813 6 ปีที่แล้ว

    thank U amigo!

  • @ArashZandi20
    @ArashZandi20 3 ปีที่แล้ว

    I didn't realize since part 11

  • @akhiljupalli3110
    @akhiljupalli3110 3 ปีที่แล้ว

    At step-6. how did we get 48 from step 3

    • @d.j.peters
      @d.j.peters 2 ปีที่แล้ว

      input was '"A Test" 6 chars * 8 bits = 48 bits

  • @WahranRai
    @WahranRai 10 หลายเดือนก่อน

    Could you go faster than that ?

  • @dangagich2689
    @dangagich2689 5 ปีที่แล้ว +2

    Woop-woop! That's the sound of da police!

  • @ameyresa3277
    @ameyresa3277 5 ปีที่แล้ว

    why in step 4 you add 1? is that necessary?

    • @TheMetalhead1311
      @TheMetalhead1311 4 ปีที่แล้ว

      Two's complement. Yes its necessary.

  • @ahsanmurad9677
    @ahsanmurad9677 3 ปีที่แล้ว +3

    I think there are some issues with this! you are running a nested loop. and getting words[i][j], j is running until 80, since each word is 32 bit long, this should return a segmentation fault!

  • @iaashu98
    @iaashu98 5 ปีที่แล้ว +1

    someone, please snatch those horrible siren sounding in the background.

  • @aymanmakhoukhi3591
    @aymanmakhoukhi3591 4 ปีที่แล้ว

    would you please send me this code I need it for my presentation

  • @alexjunquera8629
    @alexjunquera8629 7 ปีที่แล้ว +3

    dragons

  • @-_lIl_-
    @-_lIl_- ปีที่แล้ว

    "the entire text of the bible" 💀

  • @sohangchopra6478
    @sohangchopra6478 3 ปีที่แล้ว

    after watching this video, I still don't really understand how SHA-1 works. so.... not good!

  • @Kk-co2gh
    @Kk-co2gh 3 ปีที่แล้ว

    Step 11 makes no sense

  • @stfbrasil1989
    @stfbrasil1989 2 ปีที่แล้ว

    Im not undertanding

  • @eula9
    @eula9 3 ปีที่แล้ว

    seriously? 9 mins to actually start saying something of value?

    • @d.j.peters
      @d.j.peters 2 ปีที่แล้ว

      No j runs from 0 to 79 it's correct (minutes ago I tested the code presented in the clip)