Is Hashing Encryption? #shorts #encryption #hashing #password

Is Hashing Encryption? #shorts #encryption #hashing #password

David Bombal

10 месяцев назад

1,181,530 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@DeadPixelGaming
@DeadPixelGaming - 17.03.2024 09:53

Danke boet.

Ответить
@GFY_FOAD
@GFY_FOAD - 18.03.2024 06:36

I need hash to understand hash

Ответить
@therandomdude2392
@therandomdude2392 - 18.03.2024 12:03

One thing I don't get about verification is what would happen if there is a hash collision like two very different inputs but same hash value

Let's say "veryoriginalpassword" has the same hash as "mygoodpassword" how would hackers use it to their advantage? Would they be able to access the user just by using the hash? (I have the idea that they would just attack the password, like they just need to bypass the hashing part and be able to validate it, but I don't know)

Ответить
@AdamHammonds-v1l
@AdamHammonds-v1l - 18.03.2024 21:12

Hi I need to do this

Ответить
@l0g1cb0mb
@l0g1cb0mb - 18.03.2024 21:30

As is shown, by the fact that the hash remains 256 in length, there is a potential for more than one input value to compute to the same hash, very unlikely to be found before lockout of a bruteforce attempt, but that is why the length of hashes has become the measure of its strength. So it means you more than likely have the original password value, with high confidence, not 100% certainty.

But I ain't one to gossip... .

Ответить
@vicenary
@vicenary - 19.03.2024 05:14

It is not a pseudo random number. It is totally derived from the input - if I input 'a' I always get the same output - and using SHA256, you'll get the same answer on every machine.

Ответить
@beyondlimits1568
@beyondlimits1568 - 19.03.2024 07:49

Yes I can decrypt hash😅

Ответить
@korana6308
@korana6308 - 19.03.2024 16:41

Pretty sure this is how Heroes three battle algorithm works too. There's only one outcome for every action, in a chain of events.

Ответить
@---cr8nw
@---cr8nw - 19.03.2024 17:32

Bonus: there are various input values that will generate the same hash value. But it would be impossible to identify them, even if you knew the hashing algorithm, short of running a brute force database of all possible inputs and their resulting hashes.

Ответить
@sjohn-777
@sjohn-777 - 19.03.2024 20:16

Thank you!

Ответить
@Juidodin
@Juidodin - 19.03.2024 21:16

the only problem with that.. 2 different inputs can generate the same hash... so

Ответить
@AverageJoe46549
@AverageJoe46549 - 20.03.2024 11:44

But if the complex algorithms were somehow configured, you could technically decrypt it right?

Ответить
@s.h7124
@s.h7124 - 20.03.2024 16:00

Isn’t prett much like checksum or similar !?

Ответить
@pradeepkumar-fv2pj
@pradeepkumar-fv2pj - 20.03.2024 18:47

But these are not secure right?
When a person hash code of all possible word, he can know the value we're passing right?

Ответить
@Undulator369
@Undulator369 - 23.03.2024 02:32

Interesting

Ответить
@Bharath-wb8uy
@Bharath-wb8uy - 23.03.2024 16:57

Thank you

Ответить
@MA-rz5pd
@MA-rz5pd - 24.03.2024 00:03

That's not true
It is not one way. Yes, it is extremely hard to decrypt, but technically, it is double

Ответить
@vetirs
@vetirs - 25.03.2024 02:09

So whats the point of it? If I use a password without hash, you still need to check if the password is the same as you do with the hash

Ответить
@RakeshJaiswal-n5m
@RakeshJaiswal-n5m - 25.03.2024 17:47

Hello sar aapke dwara video gyanvardhak bataya gaya hai bahut acchi baat hai per main Bharat Desh ka Rahane wala hun Bharat ki baat batata hun is Desh mein itne bade bade hacker hain aap kitni achcha password dal dijiye vah Tod dete Hain aur aapka bank account Tak Khali kar dete hain aur sarkari karmchari bhi apradhon mein lete Hain

Ответить
@sunnyahmed5935
@sunnyahmed5935 - 26.03.2024 18:26

suggest me some online training course where i can learn Cyber Security and get a job . I am from NOn-CS background

Ответить
@gordr8024
@gordr8024 - 27.03.2024 02:58

Similar to crc Circular redundancy check

Ответить
@Mekyzeroone
@Mekyzeroone - 28.03.2024 04:18

Thats why i love rainbow tables 😅

Ответить
@bunyaadi
@bunyaadi - 29.03.2024 13:35

I never use real words or meaningful passcodes.

Ответить
@hassaanhameed
@hassaanhameed - 29.03.2024 23:43

Ответить
@Kyoz
@Kyoz - 30.03.2024 00:46

Do you have any recommended resources for learning to design and create hash functions? I tried looking into it once and came back with a bunch of abstract papers explaining the need for them.
🤍

Ответить
@vipereaper
@vipereaper - 31.03.2024 08:40

So if I understand this right, when someone types in a password that gets turned into a hash and store it under the email and set that as one email and password combination. And everytime they type their password, that encrypts it as a hash and sees if it matches with the hash that is connected to that specific email address.

Ответить
@yaghiyahbrenner8902
@yaghiyahbrenner8902 - 02.04.2024 10:23

Your ending was wrong. You assumed when hashing two passwords results are always the same well, it depends on the type of hash function used, look at a Salted Hash.

Ответить
@mdmehboob4443
@mdmehboob4443 - 03.04.2024 12:40

What the Hash!

Ответить
@Ippikiokami365
@Ippikiokami365 - 05.04.2024 22:21

Make one about salting

Ответить
@adammarcaidajr.9478
@adammarcaidajr.9478 - 11.04.2024 10:54

Do you think facebook stored our password as a hash?

Ответить
@hlubradio2318
@hlubradio2318 - 13.04.2024 06:00

Aaaah nice reinforcement

Ответить
@sebastian4736
@sebastian4736 - 13.04.2024 08:15

What about using cryptanalysis to get the hash back to original data, isn't it easy if you know the hash algorithm, so doesn't it become like decrpytion.

Ответить
@blankpages1622
@blankpages1622 - 13.04.2024 22:01

you earned a new subscriber :)

Ответить
@benjerodygon4050
@benjerodygon4050 - 14.04.2024 04:01

So is hashing used for passwords authentications ?

Ответить
@SpinyDisk
@SpinyDisk - 15.04.2024 17:04

But doesn‘t that mean that there is more than one input, that gives the corresponding output? The size of the hash doesn‘t change, so there is a limited amount of information stored in that hash. In this case it should be ~10^77; So, theoretically, if you were to make a bot, so fast, or with so many threads, that it could produce more than these 10^77 possible outputs, at least one output should appear twice. This, at the same time, would mean, that you could give it a random set of numbers/letters/whatever and perchance it would work (it is not very likely (2/10^77), but hey! It‘s worth a shot, isn‘t it?)

Ответить
@DsongD
@DsongD - 16.04.2024 17:48

All sudo

Ответить
@kamhaq
@kamhaq - 17.04.2024 12:38

Just create complicate password without hasshing still should work

Ответить
@armydillo9792
@armydillo9792 - 20.04.2024 05:18

What about "You've been changed this password, please make a new one!" or something like that when we resetting password? Isn't that mean 'they' know our old password?

Ответить
@amatullahali1835
@amatullahali1835 - 23.04.2024 11:03

Salam
Heard David Bombal all over when Researching cybersec resources, but mannn, I get it why! From just 1 short! You really are a very good teacher. That explanation style which just so smoothly gets into head. Kudos!

Ответить
@delmiropessoa8661
@delmiropessoa8661 - 28.04.2024 18:24

thanks

Ответить
@PilotAbgrund
@PilotAbgrund - 10.05.2024 00:06

Could you theoretically decrypt it?

Ответить
@Pavi-w6v
@Pavi-w6v - 20.05.2024 10:45

Sir I want to hack wifi network of my friend what simple method did I use?

Ответить
@mdranagmr1732
@mdranagmr1732 - 25.05.2024 06:46

so that's How jt helps in Brutforce.🎉❤

Ответить
@chairam
@chairam - 21.06.2024 10:43

Ok but it's NOT a 'computer networks only' thing

Ответить
@gaming-den
@gaming-den - 29.06.2024 21:03

Dude you are too generic. It depends on the type of hashing. There are reversable hashes. You are picking non reversable method and say all types of hashing is non reversable.

Ответить
@ΡαφαήλΣαλιάρης-ν5ω
@ΡαφαήλΣαλιάρης-ν5ω - 09.07.2024 00:12

Is that how they store passwords in apps?

Edit: you said it literally as I posted my comment. Thanks!

Ответить
@ramish9995
@ramish9995 - 21.09.2024 04:28

Bro which link is used to hash

Ответить
@1695AB
@1695AB - 10.11.2024 22:30

So it still doesn’t secure simple passwords like “p@assw0rd” or “qwerty” as hash for those is know, right?

Ответить
@RondaRice-w5v
@RondaRice-w5v - 01.12.2024 20:30

我如何从钱包中将我的 89 USDT TRC20 提现到币安请帮帮我 12个钱包恢复短语:『pride』-『pole』-『obtain』-『together』-『second』-『when』-『future』-『mask』-『review』-『nature』-『potato』-『bulb』

Ответить
@davidbombal
@davidbombal - 30.01.2024 17:31

Did you know this? Hashing is so important in todays' world!

Ответить