SHA 256 | SHA 256 Algorithm Explanation | How SHA 256 Algorithm Works | Cryptography | Simplilearn

preview_player
Показать описание

In this video on the sha 256 algorithm, we learn the basics of the sha 256 algorithm. We start with a brief recap into what is hashing, and learning about the secure hash algorithm family. We take a look at the characteristic of the SHA family and it's working from the padding of bits till we receive the hash digest. At the end, we go through the applications to fully understand how sha 256 algorithm works.

The topics covered in this video are:
00:00:00 Introduction
00:01:15 What is Hashing?
00:03:43 What is SHA?
00:05:53 SHA Characteristics
00:07:36 Steps in SHA
00:12:37 Applications of SHA

#SHA256 #SHA256AlgorithmExplained #WhatIsSHA256 #HowSHA256AlgorithmWorks #Cryptography #CyberSecurityTrainingForBeginners #CyberSecurityTutorial #Simplilearn

➡️ About Post Graduate Program In Full Stack Web Development
This program will give you the foundation for building full-stack web apps using the Java programming language. You'll begin with the basics of JavaScript, and then venture into some of the more advanced concepts like Angular, Spring Boot, Hibernate, JSPs, and MVC. Now is the perfect time to get started on your career as a full-stack web developer!

✅ Key Features
- Caltech CTME Post Graduate Certificate
- Enrolment in Simplilearn’s JobAssist
- Receive up to 25 CEUs from Caltech CTME
- Simplilearn's JobAssist helps you get noticed by top hiring companies
- Attend Masterclasses from Caltech CTME instructors
- Live virtual classes led by industry experts, hands-on projects and integrated labs
- Online Convocation by Caltech CTME Program Director
- 20 lesson-end and 5 phase-end projects
- Capstone Project in 4 domains
- Caltech CTME Circle Membership
- Build your own portfolio on GitHub

✅ Skills Covered
- Agile
- JAVA
- Hibernate and JPA
- Spring Core 50
- DevOps
- HTML5 and CSS3
- AWS
- JavaScript ES6
- Servlets
- SOAP and REST
- JSP

Рекомендации по теме
Комментарии
Автор

You can't say that the hashing function should meet a requirement for the attacker to be impossible to create 2 messages producing exactly the same hash. By design there are infinite number of messages that will produce the same hash. That's basically base rule of hashing. The size of the hash determines how hard it is to find at least 2. That's why with todays computing power it's almost impossible to find multiple inputs that would produce the same hash, but in theory that's absolutely possible.

KamilKuliczkowski
Автор

Graphics and presentation were very good. Even for a relative novice like me. Thanks.

pauldavis
Автор

The theory explanation is good. I think it will be register better me for me with a hands-on implementation.

theotherside
Автор

Good Video with easy explanation to understand

raksabb
Автор

Excellent video, now I understand it! Very well explained. 😊👍

peppermann
Автор

Everything is so good but bro this is not the working of SHA 256 its all about SHA 1 why are you guys misleading students i was so happy with the content build up my concepts and make all the possible way out and write a code in python and in the end i end i got to know that its all about sha 1 not about sha 256

BismaNoor-zp
Автор

How does the length of the original message become 64 bits?
Why do we append a 1bit followed by zeroes?
What does the length of message mean? (Is it the number of characters or the size of the message in bits) ?

vishmaychauhan
Автор

Can we use hashing on data given by users through input fields that get stored in a database ? If so which hashing algorithm is more effective

bhoomikakr
Автор

the y do we get different outputs(hashes for the same string using the same algorithm) when implemented practically ?

tejasakumar
Автор

8:04 is padding done in left or right to the original message?

ChandanSah-unxg