Python MD5 implementation

preview_player
Показать описание
MD5 is important but broken hash algorithm.
Use coupon code MCODING at checkout for up to 91% off all yearly hosting plans!

It was intended to be used for cryptographic purposes, but a plethora of attacks against it have been discovered over the years that bypass the security properties MD5 was thought to have.

In this video we look at the description, Python implementation, and some types of attacks against the MD5 algorithm.

SUPPORT ME ⭐
---------------------------------------------------

Top patrons and donors:
John M, Laura M, Pieter G, Vahnekie, Sigmanificient

BE ACTIVE IN MY COMMUNITY 😄
---------------------------------------------------

CHAPTERS
---------------------------------------------------
0:00 Intro
1:34 Implementation
7:55 Collision and attacks
Рекомендации по теме
Комментарии
Автор

oh looks like you're using 3b1b's manim, looks good!

memespdf
Автор

Your channel is so good. It really feels like there's a gap when it comes to coding/computer science YouTube. There certainly are a few good ones, but I feel like it's tiny when compared to something like (advanced) math YouTube. It's good to see someone filling that gap!

kruksog
Автор

As someone who does know code, this was very interesting. Often the exact implementation of a hash function is simply glossed over, which was always quite frustrating. Having a brief overview and explanation of the different parts was greatly illuminating, thanks for making this video!

voxelfusion
Автор

This was not very interesting to me. I think you should have spent less time reading the code aloud, and more time explaining the attacks and why they work well on MD5. For example, I felt like I did not get an answer to this question: what does a cryptographic hash function like SHA-256 do differently than MD5, and why does that make it so much safer?

FromTheMountain
Автор

Really great and informative video, however I missed some more information regarding the attacks.
How exactly do you find two different messages with the same hash? Bruteforcing or reverse engineering the algorithm?

gareth
Автор

Great video as always! I was just wondering what the assert instructions where doing in the middle of the code, aren't these supposed to be in the tests?

ninenine
Автор

This video might not be enjoying to watch but I like it more than those shallow explanation of things. This gives in depth of how md5 is structured, which if studied by oneself might take a whole lot of time. And yes, a secure algorithm is assumed or hoped to be secure unless reality knocks on the door.

daleryanaldover
Автор

Md5 is still convenient and useful for non-crypto related tasks. Like generating IDs quickly or nonces or something where you don't really care if its not secure.

JohnWalz
Автор

Manim is just perfect for this type of stuff, great work!

denizberkinmis
Автор

I love these videos so much! Best Python youtuber ever!

georgesanderson
Автор

Can you make a video about finding a collision in md5?
Sounds really interesting!

דניאלאביב-ות
Автор

since i am on the discord, i am legally obligated to write a comment containing "discord gang"

fadeoffical_
Автор

Cryptography algorithms get old with time and need to be replaced with modern algorithms. e.g. Blake3 is faster than MD5, more secure than SHA2 and SHA3 and most libraries use type-safe rust implementation. Migration to modern crypto is perceived as more expensive than the cost of all the data breaches over past few years. Industry needs to change that.

vishalmishra
Автор

Not bad. Would have been nice to hear a discussion of how the weaknesses were discovered and characteristics of the algorithm they exploited.

multiplysixbynine
Автор

Would be nice to have video about incorporation of hashing for authentication in backend application :)

amidfallen
Автор

So If I know a 128 bit MD5 origin, and a 128 bit checksum, is it possible to find the original seed phrase being used?

drygordspellweaver
Автор

Can you explain to me how to re-encode the md5# through the spectrum of the OC3 optical line

rakeeb
Автор

Hash algorithms are inherently many to one mappings. There are far more ways to arrange even 1000 bits than there are 512 bits, so it is not entirely surprising that someone found two of those many inputs that yield the same output. You seem to be saying that MD5 is somehow susceptible to this prefix attack but you are not at all clear about why.

byronwatkins
Автор

Am I the only one that thinks they sound like the fireship.io person? Haha it must be you! But in a less rushed mode. Great video!

mxskll
Автор

almost unreadable on smartphone, although there is some space in the editor :-/

PierreSoubourou