SHA-256 Simplified: What Is It And Why It Is So Secure

preview_player
Показать описание
📚Easy To Understand Books📚:

-
DISCLAIMER: This is NOT financial advice. I am just offering my opinions. I am not responsible for any investment decisions that you choose to make.
Рекомендации по теме
Комментарии
Автор

I just watched a lecture by a professor from Princeton university explaining this concept and I must say you’re explanation is 100x better and easier to understand 👍🏽👍🏽🙌🏽

asapbro
Автор

Bro your great at explaining this stuff. Appreciate the videos. Been learning a lot. There’s so many other videos on YouTube that use all this crazy terminology. I like how you use those tabs to organize what ur gonna say. Def underrated channel

MusicInMae
Автор

Hi from Argentina man !!!

I applaude you.
you made something so complex so easy to understand that I could explain SHA256 to my Granny.

thank you very much

FrancoBraidich
Автор

This was by far the best video at explaining this algorithm

itsqueendebae
Автор

All I could think about was jr high and how they made us learn power point because it was supposed to “prepare us” for “the future” - now we got tabs and it’s chill, love it

ispotato
Автор

In the case of a application password, you can have the user enter their password, hash it, and compare to a saved hash value in a db. If your dealing with known values at two ends of a process, or two separate companies, you can send a hashed value, then on the other end have a hash table with all your data values and their hash, and use that table to join on the hashed value. But, you’re still vulnerable on the db side. It does make the data transmitted safer, but anyone who understands hashing will know to attack the hash db tables on the receiving side. It’s safer to hash, then encrypt, If sending data between company servers.

davidwho
Автор

This is brilliant..thank you from someone trying to learn all this.

lisabeeke
Автор

Love how simple your explanation is. And using tabs as the presentation slide replacement!

ritchiewlc
Автор

AWESOME explanation. The dry cleaner analogy is spectacular.

paps-personal-channel
Автор

If the NSA developed the SHA 256, surely they will have the backdoor to it and will therefore be able to compromise BTC (Or mine massive amounts of BTC)? So my question is why is BTC so highly trusted if someone has the key to the algorithm?

keshavmahabir
Автор

That's a really good explanation. I am more educated than before.

mithunkurian
Автор

we could callculate how many days, a Zillionnn seconds could make 🤣🙃lmaoo, appreaciate load of words and the easy explaining

DacyrianoPlaylists
Автор

after sha256 we will most probably go to sha512?

hattrickchu
Автор

Your explanation was fantastic. Keep up the great work

carlmaynard
Автор

Since it is technically possible that there could eventually be collision resistance (there are an infinite amount of strings you can have with "only" 2^256 possible hashes), will people stop using a hash function the second they find two hashes with the same output, or is it only when a couple of hashes with the same output are found? Great video by the way - you explained it so clearly and gave so many nice references!

kaushikdr
Автор

i mean a billion is 1000 millions and 1 trillion is 1000 billions so that wasn't totally jaw dropping.

kencunningham
Автор

What would be change on output if two different person give same input in different or same time ?

summeracharya
Автор

This is interesting bro, thanks for the moment 👍👍keep it up

ITseNano_YT
Автор

This is a great explanation but i was hoping to find out how the hash works itself into the blockchain. But still, this is quite good.

irahazda
Автор

hey so when i open svhost and check properties it says in the digital signature sha256 does that mean my laptop is being used by bitcoin miners cus it fucks up my frames when i play games

dobs