How Does SHA256 Work?

preview_player
Показать описание
Since SHA1 has been broken, SHA256 is seen as one of the contenders to replace it. In this video I review why it might be needed and how it functions on a low and high level perspective by stepping through the algorithm with an example by converting abc to its digest.

I did a similar explanation for SHA1 in another video so check that out.
Ill also be doing some supplementary videos on the binary math...ill be having some fun with them :D

Music Title Olympus
by Ross Bugden

Clips used
One Piece film z - Eiichiro Oda, Tatsuya Nagamine
Avatar the last Air Bender - Joaquim Dos Santos,Michael Dante DiMartino,Bryan Konietzko
Ghost Pain - Masahiko Murata, Kazuchika Kise
Terminator Genysis - Alan Taylor,Bill Carraro,Megan Ellison
Phantasy Star Online - Keiichirô Kawaguchi,Kyohei Ito
One Piece - Kōnosuke Uda, Eiichiro Oda,Alfred Kahn,Toei Animation,Yoshihiro Suzuki
Animatrix- Peter Chung, Andrew R. Jones,Mahiro Maeda,Joel Silver
The Matrix Reloaded - Lana Wachowski (as The Wachowski Brothers), Lilly Wachowski (as The Wachowski Brothers),Bruce Berman
Bleach - Tite Kubo, TV Tokyo, Dentsu and Studio Pierrot
Boruto: Naruto Next Generations - Noriyuki Abe and Hiroyuki Yamashita
Samurai Champloo - Shinichirō Watanabe,Takatoshi Hamano,Takashi Kochiyama,Tetsuro Satomi
Рекомендации по теме
Комментарии
Автор

If you found this video useful, I made a binary calculator you can experiment on.Its a free app with some ads and downloading it really helps me do more of these videos.

EpicFactFind
Автор

I’ve been looking for a medium depth level explanation for the actual process making sha256 and this is the only video I’ve found that is satisfactory. Great job. I’d love to see more like this.
I’d actually also like to see one where you go a bit slower and go literally step by step through and example. Or creating a MATLAB program for this from scratch maybe. It would be less flashy but I would for sure watch.
In a more general sense I think you have a good niche for yourself with well written fast moving hook intro followed by a reasonably in-depth explanation aimed at very technical audiences. I think you could have a successful channel on your hands.

FYI to authenticate my comment, the SHA256 signature is:

Let me know if it’s been tampered.

stevefrayne
Автор

I was lost at "There's a war being fought"...

johnmurphy
Автор

"...that's an insight into your soul going deeper than a confession". That was a brilliant line. Quite true also

neogen
Автор

best video of all time, cant think of any better explanation in this little time, and great editing also, appreciate ur efforts for this 5 min. good job man

shubhamdadhich
Автор

It's pure beauty to see the how SHA256 forms the input to the hash. Thanks to the SHA256 function Bitcoin is possible.

BitFloh
Автор

I am saving this video in hopes to return to it one day and say, huh, this is too simple. because today I say, WTF WAS GOING ON??

aledirksen
Автор

Impressing! Best video about how Sha-256 works! Excellent job, mate!

moncu
Автор

bro this video is on another feel like i'm watching some hot anime fight scene lmaoo

twointhemorningwhatdoyouwa
Автор

Excellent video! just in time for a school project!

bradylewis
Автор

Wow dude, this is pretty impressive you went through this. Thanks for the effort.

charlescrain
Автор

I think you can afford to speak a little slower?
Nonetheless, you did a very good job visualising and explaining the algorithm, instead of describing it generally like other videos. well done

vadert
Автор

One of the only good explanations of the actual algorithm. Could I do this with pen and paper?

officiallyjk
Автор

I have never seen a video like your, nice you are an artist

BassirouRabo_h
Автор

And ladies and gentlemen, that's how a video is made.

wilhelm.reeves
Автор

sha256 each block contain how many chareterstics

Venkatnemala
Автор

Spliendid. Thanks for making this. Good explaination with the touch of anime.

jadia
Автор

thankyou, this was helpfull. Cool anime to support your message!

lukapfaendler
Автор

So just to confirm, the initial hash values a-h and the k constants are intrinsic to the algorithm and is made by this algorithm’s inventor?

sevenicolas
Автор

Also, the function you describe for creating the message schedule is incorrect. In reality there's no ROTL at the begining, as far as i recall, ROTL is not used a single time in SHA256, only in SHA-1/SHA160. I'm not sure if the values you had there for the message schedule are correct, but just in case someone needs them:

INPUT:
abc

MESSAGE SCHEDULE:

HEX:



1: 61626380
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17: 61626380
18: 000f0000
19: 7da86405
20: 600003c6
21: 3e9d7b78
22: 0183fc00
23: 12dcbfdb
24: e2e2c38e
25: c8215c1a
26: b73679a2
27: e5bc3909
28: 32663c5b
29: 9d209d67
30: ec8726cb
31: 702138a4
32: d3b7973b
33: 93f5997f
34: 3b68ba73
35: aff4ffc1
36: f10a5c62
37: 0a8b3996
38: 72af830a
39: 9409e33e
40: 24641522
41: 9f47bf94
42: f0a64f5a
43: 3e246a79
44: 27333ba3
45: 0c4763f2
46: 840abf27
47: 7a290d5d
48: 065c43da
49: fb3e89cb
50: cc7617db
51: b9e66c34
52: a9993667
53: 84badedd
54: c21462bc
55: 1487472c
56: b20f7a99
57: ef57b9cd
58: ebe6b238
59: 9fe3095e
60: 78bc8d4b
61: a43fcf15
62: 668b2ff8
63: eeaba2cc
64: 12b1edeb
BIN:



1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
38:
39:
40:
41:
42:
43:
44:
45:
46:
47:
48:
49:
50:
51:
52:
53:
54:
55:
56:
57:
58:
59:
60:
61:
62:
63:
64:

FINAL HASH:


bnjmn-szqo