I am so happy that I came across your video. Everyone else teaches like you already know everything and gives out too much technical jargon! This explanation was so clear and understandable. Thank you so much! I was having a hard time understanding hashing, but now is very clear!
Thank you, professor, for these videos, they are incredibly useful. I have watched the Hash code and the asymmetric cryptography videos. They are excellent!
thanks dear for this great video , but i didn't understand exactly why the MD5 is not secured anymore for digital integrity ? can you please explain in brief ? thanks
It is possible to take a file and an MD5 signature that you want the file to have and add data to the end of the file to match the target MD5 hash. This means that the MD5 hash is no longer doing a good job of uniquely identifying content. You might want to use an MD5 hash to identify a program as being safe. But a malware author can take a harmful program and add characters to it to match the MD5 sum and then replace the original file with the malware. A good hash would make it very very hard to go backward from hash to creating a source file.
Is it smart to produce from a string(for example) with some sort of light encryption( like a simple homemade codification ) and only then use the hash algorithms? Because it adds another layer I'm inclined to think it's stronger, but I would like to know if that's true or not!
+djp3 Is it stronger if I use a less powerful algorithm and then use that output in an hashing algorithm? I was curious because it's not recommended to use double hashing.
I unexpectedly ended up with this video, but believe me it is wonderful. You broke down the concept so perfectly. BIG THUMBS UP
I am so happy that I came across your video. Everyone else teaches like you already know everything and gives out too much technical jargon! This explanation was so clear and understandable. Thank you so much! I was having a hard time understanding hashing, but now is very clear!
+Laura Dencer This was for a very mixed audience of students, so I'm glad it worked. :)
This tutorial was very simple to understand. I really enjoyed it.
thanks!
Congratulation for your excellent work. I dont speak very well english but i understand all that you said 100%. Excellent work. Congratulations again.
thanks!
I was looking at car vids and ended up here. I don't do any of this, but even I was able to understand this. Good video.
Thanks. Car videos -1, Hash Code Videos +1
Thank you, professor, for these videos, they are incredibly useful. I have watched the Hash code and the asymmetric cryptography videos. They are excellent!
Glad you like them!
Excellent videos. Thanks.
thanks dear for this great video , but i didn't understand exactly why the MD5 is not secured anymore for digital integrity ?
can you please explain in brief ?
thanks
It is possible to take a file and an MD5 signature that you want the file to have and add data to the end of the file to match the target MD5 hash. This means that the MD5 hash is no longer doing a good job of uniquely identifying content. You might want to use an MD5 hash to identify a program as being safe. But a malware author can take a harmful program and add characters to it to match the MD5 sum and then replace the original file with the malware. A good hash would make it very very hard to go backward from hash to creating a source file.
Is it smart to produce from a string(for example) with some sort of light encryption( like a simple homemade codification ) and only then use the hash algorithms? Because it adds another layer I'm inclined to think it's stronger, but I would like to know if that's true or not!
+Pedro Barbosa I'm not sure I understand your question. Can you elaborate? And it sounds like this might be a better question for stackoverflow
+djp3 Is it stronger if I use a less powerful algorithm and then use that output in an hashing algorithm? I was curious because it's not recommended to use double hashing.
+Pedro Barbosa The details really matter in security applications, but this is definitely a question better suited to stackoverflow.
thank you for a good explanation
Thanks!
THIS IS MY QUESTION: CHEATING CAN HAVE THE HASH CODES IN ELECTION WHEN LEADING SENATOR? THANK YOU.
What is your view on SHA 571?
I'm not familiar with that. Is that a thing?
i wonder how many people have the password "bicyclefrogtoast" now
+Justin De Jong You know you want to change yours. :)