SHA: Secure Hashing Algorithm - Computerphile

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 612

  • @realeques
    @realeques 7 років тому +1177

    Mike Pound is by far my favorite person on this channel... he has the most interesting subjects, shines with crazy knowledge while still keeping the video fresh and dynamic.

    • @hdef6602
      @hdef6602 7 років тому +14

      I like him and his topics too, though the AI topics are interesting and the person explaining them is good too

    • @TroPy1n
      @TroPy1n 7 років тому +23

      he has great body language, tries to use it as much as possible

    • @SophiaAstatine
      @SophiaAstatine 7 років тому +21

      And a fair looker.

    • @suiko619
      @suiko619 7 років тому +4

      And the same accent as the 11th Doctor (Matt Smith)! :-D Where is that accent from?

    • @thanh-binhnguyen5603
      @thanh-binhnguyen5603 6 років тому +11

      Absolutely agree, Tom Scott is my second favourite, that guy is hillarious

  • @Timber5887
    @Timber5887 7 років тому +173

    I could sit and watch videos from this guy all day long, so informative and laid back

  • @Sicaoisdead
    @Sicaoisdead 4 роки тому +69

    Love how these videos get STRAIGHT to the point.

  • @DanMcB1
    @DanMcB1 3 роки тому +1107

    This is too much work, can’t we just trust each other?

    • @rishabhhedaoo9926
      @rishabhhedaoo9926 3 роки тому +69

      That ,my friend, is the real problem

    • @DynestiGTI
      @DynestiGTI 3 роки тому +77

      How can I trust other people when I can't even trust myself

    • @DanMcB1
      @DanMcB1 3 роки тому +15

      @Mohamed Seid GodisGood666!

    • @binarung7747
      @binarung7747 3 роки тому +12

      Dont trust verify

    • @jephmukiza4015
      @jephmukiza4015 3 роки тому +5

      No Way!!!

  • @krishnanmuru-girthy7656
    @krishnanmuru-girthy7656 3 роки тому +24

    Been watching a whole bunch of Mike's videos as a complement to my introductory module on Security and Authentication. One of the best teachers I have come across!

  • @canyakar7443
    @canyakar7443 Рік тому +5

    I've been trying to understand the concept for 3 days from the slides my teacher covered and the book she shared and ended up with complicated mind, this video gave me a pure understanding in 10 mins. Great job!

  • @sara-n5q
    @sara-n5q 6 років тому +957

    Roses are red
    Violets are blue
    Unexpected { on line 32

  • @jony7779
    @jony7779 7 років тому +17

    Mike Pound is the best! I love hearing him explain things - keep em coming!

  • @JimmyGeniusEllis
    @JimmyGeniusEllis 6 років тому +3

    I am at a hackathon in Chicago Illinois at Illinois Institute of technology and I have to use sha-1 on some facts before I pass then to an api so I can make a project for the Hackathon. You did a wonderful job telling me what she-1 was so I could understand the cryptic api documentation. Thank you very much.

  • @CJBurkey
    @CJBurkey 7 років тому +7

    This is my favorite guy on this channel. I just love stuff like this.

  • @donovanlay9835
    @donovanlay9835 3 роки тому +1

    The washing machine example really helped seal in this topic I was trying to understand and helped me on my final project. Thank you!!!

  • @andysmith1870
    @andysmith1870 7 років тому

    Thanks, Dr Pound (if you read this). I find your demeanour easy to engage with, and you set me off on the journey of understanding fully (with much work!).

  • @Hari-888
    @Hari-888 6 років тому

    pound for pound Mike pound is the best narrator on computerphile

  • @dreammfyre
    @dreammfyre 7 років тому +136

    My dealer need this.

    • @crypto_admin4150
      @crypto_admin4150 3 роки тому

      Appreciate your feed back!
      Thanks for watching, for more info and guidance on how to trade and earn.
      W…h…a…t…s…A…p…p~~M.E……
      +…1…7…2…0…3…1…9…7…5…5…1

    • @jephmukiza4015
      @jephmukiza4015 3 роки тому

      😂😂😂😂😂

    • @planetashre7287
      @planetashre7287 3 роки тому

      😆

    • @NStripleseven
      @NStripleseven 3 роки тому

      🤣

  • @xXParzivalXx
    @xXParzivalXx 7 років тому +238

    Hmm, so far this is fairly straightforward, but the interesting part would be how exactly these compression functions work. Will there be a follow-up video on that?

    • @liljuan206
      @liljuan206 5 років тому +39

      In essence, it generates 80 32 bit words derived from bits of the plaintext, then the state does right circular shifts, some XORs, some bitwise ANDs, addition with the round word and round constant, and then permutation between all state variables

    • @onlyheretowatchfailcompilation
      @onlyheretowatchfailcompilation 5 років тому +12

      @@liljuan206 thanks, this really helped clearing things up

    • @jacko314
      @jacko314 4 роки тому +4

      it isn't compression he is describing it is hashing. which is not what encryption is. which is what sha is. (notice the s part stands for secure).

    • @jay-tbl
      @jay-tbl 3 роки тому

      @@liljuan206 how do they make it so it can't be reversed?

    • @Nick-lx4fo
      @Nick-lx4fo 3 роки тому

      In essence Sha-2 uses 6 primary functions: Choice and Majority, and S0, S1, E0, and E1 all which move and permutate bytes around during compression

  • @michaelcrosby7715
    @michaelcrosby7715 3 роки тому +2

    Me: Explain SHA
    Dr. Pound: Explains it
    Me confused: Explain it to me like I'm 12
    Dr. Pound: Explains it like I'm 12
    Me still: Explain it to me like I'm 5...

  • @ellenasman7572
    @ellenasman7572 2 роки тому

    I've always loved your videos and now I study computer science and can watch your videos for studying, it's amazing

  • @TheMrKeksLp
    @TheMrKeksLp 7 років тому +34

    Note to self: Don't use a regular monitor as a touch screen

    • @Teknishun
      @Teknishun 5 років тому +3

      Its a university flatron monitor, probably expendable.

  • @seraph3290
    @seraph3290 7 років тому +1

    Mike you are my favourite person to appear on this channel. I enjoy your clear explanations and like the quite recent toppics like google deep dream, dijkstra and so on.

  • @mbharatm
    @mbharatm 6 років тому +2

    easy-going video which explains just enough about SHA algo to keep it simple. The details are better learnt once you "get" the basic idea.

  • @maamiimii
    @maamiimii 7 років тому +9

    I love this channel so much...

  • @Andranadu
    @Andranadu 7 років тому +784

    SHA Hashing Algorithm?
    Secure Hashing Algorithm Hashing Algorithm

  • @foobars3816
    @foobars3816 7 років тому +281

    You explained everything except for the part that actually matters. :(
    You may as well have said, sha works by shaing things.

    • @pierredonias8940
      @pierredonias8940 7 років тому +8

      Exactly my thought :/

    • @folkafresflo
      @folkafresflo 6 років тому +24

      That they explain complicated things in an easier to understand manner. Sorta like every other video they make.

    • @03Jan09
      @03Jan09 6 років тому +47

      Ah, I see now...it's a washing machine with some knobs that does the sha'ing.

    • @JonasDAtlas
      @JonasDAtlas 6 років тому +28

      The compression function of SHA is where it gets quite complicated, and I don't think it would've fit into the scope of one video, as explaining it to someone with no prior knowledge isn't trivial, there's quite a bit of complicated math involved, and very few people actually understand the details of it.

    • @isbestlizard
      @isbestlizard 5 років тому +1

      YES exactly this..

  • @perahoky
    @perahoky 5 років тому

    Some people speak terrible not understandable english, he is one of them. Even whole words were not completely spoken.

  • @jevaispartout1271
    @jevaispartout1271 2 роки тому +1

    Since SHA is deterministic, even though it is non-reversible, it is still possible to guess the hashes of some reasonably short messages. For example, string 'abc' ALWAYS produces ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad. If I have a large enough database plus computational power, I could probably guess some short messages, although not the entire novel.

    • @pro-socialsociopath769
      @pro-socialsociopath769 Рік тому +1

      That's exactly how most cracking is done. Hashed database against hashed database lol

  • @daft_punker
    @daft_punker 7 років тому

    I love these videos when Dr. Mike Pound is in them.

  • @bluekeybo
    @bluekeybo 7 років тому +1

    Dr Mike Pound is the best! More videos with him please

  • @_aullik
    @_aullik 7 років тому +208

    How does the padding work if a block is 511 bits long?

    • @KuraIthys
      @KuraIthys 7 років тому +107

      aullik Considering almost all real-world data is stored as a stream of bytes (8 bit values), That's incredibly unlikely to ever come up.
      It could be 504 bits, but 511 is highly improbable.
      If your padding has to add at least 8 bits (one byte), then the thing he described works fine.
      Remember working with individual bits is almost unheard of in computing.
      If you have to store individual bits for storage efficiency, you pack them into bytes.
      (similarly, if you store 7 bit values, you either store them in 8 bits and ignore a bit, or you pack it such that you store, say, 56 bit blocks. (7 x 8 - eg, 8 sets of 7 bits stored in 7 bytes)

    • @tiikoni8742
      @tiikoni8742 7 років тому +15

      aullik: Exactly the question that raised to my mind too :-) Since there isn't necessary enough bits left in the block to include the length of actual message.

    • @Shadow4707
      @Shadow4707 7 років тому +56

      You could add another block of 512 bits to the end to make it work.

    • @SirLugash
      @SirLugash 7 років тому +13

      +KuraIthys
      Going with bytes, the longest message that could still be padded would be 496 bits long. 504 wouldn't work as you'd only have 8 bits left but 504 in binary is already 9 bits long.

    • @_aullik
      @_aullik 7 років тому +8

      +Kuralthys
      I know that we usually work with bytes, But even if we say we have 512-8 = 504 bits Then we add 1 '1' bit to start the padding and now we only have 7 bytes left. The message is 504 bytes long but we can only store 128 in 7 bits.
      The only answer is that we expand to 1024 bits. But the question would be how do we expand. What is the "syntax" for the lack of a better word

  • @miles4711
    @miles4711 7 років тому +101

    Would you please explain the workings of the "washing machine"? ;-) I.e. the compression functions?

    • @miles4711
      @miles4711 7 років тому +1

      Thanks. I'll give this snippet a look. :-)

  • @eljaguar4789
    @eljaguar4789 2 роки тому +1

    Thank you so much. I had a hard time finding someone to explain it well

  • @atmunn1
    @atmunn1 7 років тому +5

    I kinda want to make my own hashing algorithm now. It wouldn't be very good, it would just be some random jostling around of bits until it looks weird.

  • @lawrencedoliveiro9104
    @lawrencedoliveiro9104 4 роки тому +1

    3:17 And the reasons why the NSA came out with SHA-1 to replace the earlier SHA-0 (or just plain “SHA”) were not revealed publicly. But the weaknesses in the original SHA were discovered independently a few years later. This was part of a sequence of evidence indicating that the gap between public, unclassified crypto technology and what the NSA has was narrowing, and may not be significant any more.

    • @firstlast8847
      @firstlast8847 2 роки тому

      I think it's widening because look at Pegasus and with Pegasus 2.0 you only need phone number to target a victim.
      And, Pegasus is joint project between Israel and USA. Imagine what NSA would have kept to themselves.
      It is common understanding in computer security feild that if government wants you, they have you.

  • @alakhdar100
    @alakhdar100 Рік тому

    The key idea that i got from this video is that hashing is not encryption and there is a difference between the two, while its easy someone confuse between them.

  • @somedude3203
    @somedude3203 6 років тому +1

    Another video explaining SHA-256 would be awesome.

  • @theignorantphilosopher4855
    @theignorantphilosopher4855 7 років тому +5

    What I want to know, for no particular reason, is if there are cases where a hash of a hash equals itself, of course sticking with one particular algorithm and hash length.

  • @samielyousfialaoui8975
    @samielyousfialaoui8975 2 роки тому

    Re watched it at least 10 times. Thank you for this explanation

  • @explosu
    @explosu 5 років тому +4

    The thumbnail made me think "OSHA" with the O as Dr Pound's head.

  • @niyatikhandelwal7017
    @niyatikhandelwal7017 3 роки тому

    Loved the washing machine demonstration!

  • @nadeemshaikh9364
    @nadeemshaikh9364 5 років тому +3

    For those who did not get padding.
    SHA1 works with 512 bits or multiples of it. If the message is less than 512 then you need to pad it.
    Let’s say the message is 10011, Before you hash it, you need to pad it to make it 512 bit long.
    Note that it has a length of 5 bits only. 5 is represented in binary is as 101.
    You start padding with 1 always so 6th digit will be 1 and pad 101 as last 3 digits.
    Pad the remaining digits (512 - 5 - 1 - 3 = 503) as 0s
    So message with padding will look as below.
    10011_100000000........000101
    (“_” represents start of padding)

  • @איילהגיניהערוצהשני

    the video's shoots are like modern family and that make's me happy ! also the information so thanks!

  • @joinedupjon
    @joinedupjon 7 років тому +47

    Thought I was following until 9:35
    He describes a way of padding that will produce the same padding string for messages with the same length - then says it's important that messages with the same length don't have the same padding string. Did something important end up on the editing room floor?

    • @Computerphile
      @Computerphile  7 років тому +29

      I'll check with Mike but I think it was just a slip of the tongue - ie The padding would be the same for messages of the same length but the messages would be different if they are different >Sean

    • @Mat2095
      @Mat2095 7 років тому +5

      No, "0010110" padded would be "0010110100000...", but "001011000" would be "001011000100000...", so the 1 (first bit of padding) would be later.

    • @hellterminator
      @hellterminator 7 років тому +6

      +Mat2095 He obviously meant if you just pad them with zeros.

  • @daanwilmer
    @daanwilmer 7 років тому +1

    I remember when SHA1 was actually still secure, and people could get away with MD5 (although it was started to be frowned upon). Now I feel old.

  • @ghostrecon8193
    @ghostrecon8193 7 років тому +11

    It'd be amazing to see Dr.Pound reviewing some books from his collection. Get to know his technical interests apart from image analysis.

  • @tresteinjordklatt8133
    @tresteinjordklatt8133 7 років тому +5

    I would love to see a video about the compression function! :)

  • @jordanadkins4362
    @jordanadkins4362 4 роки тому +1

    @5:21 "We might talk about that in a bit", proceeds to encrypt that bit in sha and turns it to 160 bits

  • @nO_d3N1AL
    @nO_d3N1AL 7 років тому +1

    I always wondered how these things work. Great video

  • @gilb8571
    @gilb8571 7 років тому

    If that's how it works, it is very easy to find collisions:
    1. Hash 20 bits long data
    2. Copy the 512 long data that have been created (by the rules of padding one followed by zeros plus the size)
    Then you have two inputs that are essentially the same who share the same output.
    So I think there is a lot more sense in applying those rules no matter what the size of the input is, and adding 512 bits blocks to the end if needed.
    I think this is how the SHA works.

    • @pH7oslo
      @pH7oslo 7 років тому +1

      That's how it works, yes - it's always padded. Without padding you can easily append whatever you like at the end of a message; an important part of the integrity check is to tell where the message ends.
      It's not at all easy to find collisions, though. When you hash 20 bits of data you're actually hashing 512 bits of data as the algorithm only works with exactly 512 bits at a time, i.e. one block. The remaining 492 bits must therefor be padded in a consistent way - if you pad it this way and I pad it that way, we'll end up with different 512 bit blocks, which in turn will result in very different hashes.
      If the message length (in bits) modulus 512 is 447 or less, there's room for the padding which is one 1, followed by however many 0's needed to get to 448 bits. Finally, the 64 bit length of the message is added (which brings it up to exactly 512 bits). If there's not enough room, additional 0's are added in a following block, up until there's only 64 bits left. (If the message length modulus 512 is 0, then the final block will consist of nothing but a 1 followed by 447 0's and then the length.)

    • @LauraStonebraker-nh1ff
      @LauraStonebraker-nh1ff Рік тому

      10:21

  • @krakenmetzger
    @krakenmetzger 5 років тому

    What's amazing is the Tom Scott "rocket" animation didn't show up on a video from Dr. Pound

  • @KX36
    @KX36 7 років тому +10

    5:50 summarised the subject in 1 sentence ;-)

  • @kvelez
    @kvelez 2 роки тому

    4:30
    SHA-1
    5:24
    Compression Fuction.
    6:29
    Permutation.
    7:36
    SHA reversion.

  • @stefanpopescu4914
    @stefanpopescu4914 7 років тому

    Love the Schildt on your wall!

  • @fixingstuff8117
    @fixingstuff8117 5 років тому +2

    I like the words at the end. The shower function. Murkland damn.[...] Obviously speech recognition still have some way to go.

  • @offYears
    @offYears 5 місяців тому +1

    would love an video on SHA-3

  • @LLubdeRr
    @LLubdeRr Рік тому +2

    This man forgot more about IT security than i will ever learn

  • @jamesslaterly8670
    @jamesslaterly8670 3 роки тому

    keeps me engaged great explanation

  • @user-cx2bk6pm2f
    @user-cx2bk6pm2f 3 роки тому +2

    I feel like a genius learning everything here!

  • @CliveReyes
    @CliveReyes 3 роки тому

    Sometimes I wonder how Mike's videos are free.

  • @mubafaw
    @mubafaw 10 місяців тому

    Elegant explanation. Thank you, Thank you, Thank you 😊👍

  • @Quarker
    @Quarker 7 років тому +4

    How do you know the "1000000..." padding bits are for padding purposes, and not part of the actual data/plaintext itself?

  • @justjoeblow420
    @justjoeblow420 4 роки тому

    Ah this video has aged like milk, or rather SHA1 has I should say. It's a prime example of why you can never count on anything permanently being secure as eventually a basic error in the underlying math will be found and exploited.

    • @danielf.7151
      @danielf.7151 3 роки тому

      AFAIk SHA2 is considered secure for the moment. And the very basic process is the same for them

  • @purple-sky-ro
    @purple-sky-ro 3 роки тому

    Finally a simple explanation of why the hash functions can't be reversed

  • @johanhendriks
    @johanhendriks 2 роки тому +1

    That 011001011 he wrote down is actually the start of the SHA hash value for "abd". I wonder if that was intentional, because the odds of that happening randomly are less than one percent.

  • @wesleymays1931
    @wesleymays1931 4 роки тому

    I didn't know that SHA was short for anything until now.

  • @juanferpz4158
    @juanferpz4158 3 роки тому +1

    9:49 captions about Merkle-Damgard Construction are hilarious

  • @player6769
    @player6769 7 років тому

    never been this early for a computerphile, dope

  • @xXGGAMINGXx
    @xXGGAMINGXx 7 років тому +84

    Anyone notice the 'hacking' book on the shelf behind?

    • @quorkquork
      @quorkquork 7 років тому +16

      It doesn't look like anything to me

    • @cyancoyote7366
      @cyancoyote7366 7 років тому +65

      Hacking: The Art of Exploitation is a great book by Jon Erickson, which teaches you the basics of reverse engineering, code flow, basic C programming, the stack, networks and other things to get you started on binary exploitation. It's a great book, I recommend it to anyone who's willing to invest time in learning how to hack properly.

    • @hdef6602
      @hdef6602 7 років тому

      lol

    • @oneandonlyflow
      @oneandonlyflow 7 років тому

      cyancoyote is knowledge of a programming language required?

    • @oneandonlyflow
      @oneandonlyflow 7 років тому

      cyancoyote Thanks for the reply. I've heard by many people that C is a very hard language to learn though... do you have any recommendations for introductory books to learning assembly?

  • @TheSam1902
    @TheSam1902 7 років тому +1

    Since there is an infinite amount of information that can fit in an infinite long string of characters and that a hash output a finished string of characters then two strings can have the same hash. Since the hash function is losing information it is mathematically impossible to have a perfect hash function with an arbitrary long input string

    • @RitobanRoyChowdhury
      @RitobanRoyChowdhury 7 років тому +2

      Summarizing data is not the point. You should look at Tom Scotts video on hashing to understand the difference between hashing and compression.

    • @user-zu1ix3yq2w
      @user-zu1ix3yq2w 7 років тому

      Samuel Prevost Sounds right. Finished = finite?

  • @MinorMood
    @MinorMood 2 роки тому

    Orchestral score sheet was pretty a unexpected thing to see in a video about cryptography =))

  • @unperrier5998
    @unperrier5998 3 роки тому

    Excellent, finall a video with subtitles :)

  • @kuhicop
    @kuhicop 6 років тому +1

    It would be amazing a video how you can get tracked for example: ip, mac, canvas, hd serial number, etc
    Thanks for your great work!

  • @drnagajima
    @drnagajima 3 роки тому

    Superb video! Understood it even better with a lefty teaching me ;)

  • @neonwhitey
    @neonwhitey Рік тому

    Mike is the best

  • @crummybadger
    @crummybadger 7 років тому

    Excellent as usual, good learning resource

  • @rdmeier
    @rdmeier 7 років тому

    I have no sound in either Chrome or Edge. The commercial at the beginning plays just fine. Other videos play fine.

  • @stellardancing
    @stellardancing 3 роки тому

    Love these videos.

  • @ThatJay283
    @ThatJay283 3 роки тому +2

    9:18 The trailing 1 is added at the next byte. So if you have:
    01101010
    it will be padded like this:
    01101010[100000000000000000000000000000........ 448] + (64 bits of message size)
    If there isn't enough space for the 64 bit size block the block will be padded to the end and the size will get its own block. So like this:
    Block 1:
    01101010......[1000000000000000000000000000000........ 512]
    Block 2:
    [000000000....... 448] + (64 bits of message size)
    I know this because I made my own implementation of the SHA-1 and SHA-2 algorithms

    • @sachinfulsunge9977
      @sachinfulsunge9977 3 роки тому

      Hey can you explain me everything in brief again I wanna know If I got my thinking right

  • @robertbrummayer4908
    @robertbrummayer4908 3 роки тому

    Good job! Your videos are excellent.

  • @idogtv
    @idogtv 7 років тому +2

    Oh nice, string hashing via SHA1 is something I've been interested in.

  • @Luk3Stein
    @Luk3Stein 11 місяців тому +1

    What happens if a message is smaller than 512 bits but long enough for the padding part to not have any space left to store the length of the message?

    • @danielf.7151
      @danielf.7151 11 місяців тому +2

      Then you pad to 1024 bits(including message length)

  • @eduardojreis
    @eduardojreis 4 роки тому +1

    9:40 I didn't quite understand how that padding scheme guarantees that messages with the same size would not share the same padding.

  • @murk1e
    @murk1e 7 років тому +5

    What if the message is only a few bits shy of a block, not enough room for padding bits as described?

    • @MatthijsvanDuin
      @MatthijsvanDuin 7 років тому +12

      If there's less than 65 bits of space left in the final block for padding, you just pad toward an extra block. For example if your message is 480 bits, you add a one-bit, 479 zero-bits, and the 64-bit length, giving total length 1024 bits = 2 blocks.

    • @murk1e
      @murk1e 7 років тому +1

      Matthijs van Duin thanks

  • @johnmiller8884
    @johnmiller8884 7 років тому +2

    Can you talk about the colliding prefix issue? As I understand it once I find a collision with a file, I can continue to create collisions by appending the same thing to both files, and some how this allows me to create two meaningful files each with the same hash value where one might expect that any collision which might be found would be obviously fake because it would have to be made up of a bunch of random bits.

  • @JavierSalcedoC
    @JavierSalcedoC 7 років тому

    Interestingly, since the number of inputs is infinite, there are infinite inputs resulting in the same digest. Don't try to find a collision tho, 2^160 is in the order of the number of atoms in the universe

  • @Gunth0r
    @Gunth0r 7 років тому

    wingardium levioSHA! (is what I immediately thought of when you started the video with 'shaa...').

  • @ac130kz
    @ac130kz 7 років тому +1

    Nice! Could you make a video about post-quantum cryptography please? It will be a great opportunity to learn more about this stuff

  • @tymothylim6550
    @tymothylim6550 3 роки тому

    Thank you very much for this video :) It was very helpful and educational!

  • @TheDailyMemesShow
    @TheDailyMemesShow Рік тому

    Llama 2 recommended your channel on this topic 💯 😊 crazy, isn't it?

  • @CarzyNavi
    @CarzyNavi 4 роки тому +6

    0:34 who made that visual ? :P

  • @TacoMaster3211
    @TacoMaster3211 7 років тому +2

    How would the padding work if the final block of the message was long enough that you don't have enough padding room to say the number of bit in the message? So if the final block contained 510 bits you would have to pad in 9 bits(111111110) to say that the message is 510 bits, but you would end up with more than 512 bits.

    • @LasradoRohan
      @LasradoRohan 2 роки тому

      The length field has a fixed size (which is sufficient enough) (also the field is not optional). The length of 10...0 is decided including the size of the length field i.e. you could jump over to the next block if required.

  • @DancingRain
    @DancingRain 6 років тому +1

    What happens if your message is, say, 509 bits in length? How do you pad it if the length won't fit?

  • @CaseyRedDragon
    @CaseyRedDragon 7 років тому +1

    You teach this better then my professor

  • @amultitaskingperson
    @amultitaskingperson 2 місяці тому

    it's funny how video quality has not changed much in the past 7 years

  • @Thammarith
    @Thammarith 7 років тому +6

    At 0:34, my mind went dirty.

  • @taqqiraja2722
    @taqqiraja2722 Рік тому +1

    don't stop the video at 0:35

  • @whatever-ko8qx
    @whatever-ko8qx 3 роки тому

    7:50 that made it click for me, thanks!

  • @Nanofuzz
    @Nanofuzz 6 років тому

    Thank you computerphile:-)...

  • @d_vibe-swe
    @d_vibe-swe 7 років тому

    Thank you! Made hashing much clearer for me now :)

  • @tj9382
    @tj9382 4 роки тому +1

    He’s a very knowledgeable guy, what are his qualifications ?

  • @otnielwatanabegarcia5236
    @otnielwatanabegarcia5236 7 років тому +1

    dude cleaned everything up except his monitor

  • @darklordohmight9734
    @darklordohmight9734 3 роки тому

    I love your funny words, magic man.