What Is Hashing? | What Is Hashing With Example | Hashing Explained Simply | Simplilearn

Sdílet
Vložit
  • čas přidán 27. 07. 2024
  • 🔥📘Cybersecurity Career Guide (Free) - l.linklyhq.com/l/1ybzo
    🔥Post Graduate Program In Cyber Security: www.simplilearn.com/pgp-cyber...
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advan...
    🔥Cyber Security Masters Program (Discount Code - YTBE15): l.linklyhq.com/l/1yhwf
    In this video on what is hashing, we learn about what is hashing with an example, the different applications, advantages and ways to strengthen hashes. Hash functions and hashing guidelines are also explained, and we take a look at how salting and peppering help reduce hash collisions to round out our lesson on hashing explained simply.
    The topics covered in this video are:
    00:00:00 Why Is Hashing necessary?
    00:02:09 What Is Hashing?
    00:03:10 Real-World Implementation
    00:04:41 Hash Functions
    00:05:46 Hashing Guidelines
    00:07:29 Ways to Strengthen Hashes
    🔥FREE Cyber Security Course: www.simplilearn.com/learn-cyb...
    ✅Subscribe to our Channel to learn more about the top Technologies: bit.ly/2VT4WtH
    To access the slides, click here: www.slideshare.net/Simplilear...
    ⏩ Check out the Cyber Security training videos: • Cyber Security Playlis...
    #WhatIsHashing #HashingExplained #WhatIsHashingWithExample #HashingAlgorithmsAndSecurity #HashFunctionsExplainedSimply #CyberSecurity #CyberSecurityTrainingForBeginners #CyberSecurityTutorial #simplilearn
    ➡️ About Post Graduate Program In Cyber Security
    This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing data, including risk analysis, mitigation, and compliance. You will get foundational to advanced skills through industry-leading cyber security certification courses that are part of the program.
    ✅ Key Features
    - Simplilearn Post Graduate Certificate
    - Masterclasses from MIT Faculty
    - Featuring Modules from MIT SCC and EC-Council
    - 8X higher interaction in live online classes conducted by industry experts
    - Simplilearn's JobAssist helps you get noticed by top hiring companies
    - Industry case studies in cyber security
    - Access to CEH Pro Version
    - 25+ hands-on projects
    - Capstone project in 3 domains
    - MIT CSAIL Professional Programs Community
    ✅ Skills Covered
    - Advanced Hacking Concepts
    - Network Packet Analysis
    - Ethical Hacking
    - IDS Firewalls and Honeypots
    - Security and Risk Management
    - Network Security
    - Software Development Security
    - Cryptography OSI and TCPIP Models
    - Identity and Access Management
    - Security Assessment and Testing
    - Trojans Backdoors and Countermeasures
    - Mobile and Web Technologies
    Learn more at: www.simplilearn.com/pgp-cyber...
    🔥FREE Cyber Security Course: www.simplilearn.com/learn-cyb...
    For more information about Simplilearn courses, visit:
    - Facebook: / simplilearn
    - LinkedIn: / simplilearn
    - Website: www.simplilearn.com
    - Instagram: / simplilearn_elearning
    - Telegram Mobile: t.me/simplilearnupdates
    - Telegram Desktop: web.telegram.org/#/im?p=@simp...
    Get the Android app: bit.ly/1WlVo4u
    Get the iOS app: apple.co/1HIO5J0
    🔥🔥 Interested in Attending Live Classes? Call Us: IN - 18002127688 / US - +18445327688

Komentáře • 50

  • @SimplilearnOfficial
    @SimplilearnOfficial  Před rokem

    🔥Post Graduate Program In Cyber Security: www.simplilearn.com/pgp-cyber-security-certification-training-course?WhatIsHashing&Comments&
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?SCE-IIITBangaloreCS&Comments&
    🔥Cyber Security Masters Program (Discount Code - YTBE15): www.simplilearn.com/cyber-security-expert-master-program-training-course?SCE-MasterCS&Comments&

  • @avinashkarthik8677
    @avinashkarthik8677 Před rokem +15

    if the same hash function is used to determine if the passwords match, then if someone finds out what the function is then cant they decrypt the password?

  • @SimplilearnOfficial
    @SimplilearnOfficial  Před 3 lety +5

    Got a Question on this topic? Let us know in the comment section below 👇 and we'll have our experts answer it for you. Cheers!

    • @lakshminarayandwivedi1892
      @lakshminarayandwivedi1892 Před 3 lety

      Considering a situation where i login on any website again and enter password so does my password will again convert into hash digest then it will go to server to match the my previous password within the records. So my password will only have one hash that will be stored on that server?
      For e. G. My password is password@09
      And due to hashing it is converted to ahl&hua@%hj.
      So,when I will login again on the website so does my password will again convert into the same hash digest and will go for password match.
      Also if any other person create account and by any mean if his password is matched with mine so does hash digest will convert his password as same digest as mine?

  • @himanshujoshi3601
    @himanshujoshi3601 Před 2 lety +15

    I have watched a few videos on Hashing, this is hand down the best explanation. Thanks!

  • @bantymech8242
    @bantymech8242 Před 3 lety +5

    Lovely simplelearn...
    Just read an article about encryption and hashing but you explained clearly. Thank you so much

  • @barbobrien2097
    @barbobrien2097 Před 5 měsíci

    Very well-explained. Thanks.

  • @liamkandel3823
    @liamkandel3823 Před 8 měsíci

    Great explanation!

  • @MIZ_MIRROR
    @MIZ_MIRROR Před 18 dny

    Thank you for the explanation

  • @savioa5929
    @savioa5929 Před 2 lety +2

    Will the output(Digest) be the same if i use any hashing algorithms?

  • @rodrigocossioperez
    @rodrigocossioperez Před 2 lety +1

    This was enlightening, thank you!

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 2 lety

      Keep learning with us .Stay connected with our channel and team :) . Do subscribe the channel for more updates : )

  • @rajatbishnoi7434
    @rajatbishnoi7434 Před rokem +4

    This video is great sir for a beginner but i have a question if the pepper is same for all users and 2 user have same password and pepper wouldn't there be hash collision ?

  • @Anonymous_it_is
    @Anonymous_it_is Před 3 lety +1

    Loved the explanation.
    Thanks for uploading

  • @zekezamora1770
    @zekezamora1770 Před rokem

    Very clear! Thank you.

  • @datag1199
    @datag1199 Před 2 lety +1

    Great video! Thank you

  • @scottdavis4439
    @scottdavis4439 Před rokem +1

    This was great, thank you!

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před rokem

      We're so glad that you enjoyed your time learning with us! If you're interested in continuing your education and developing new skills, take a look at our course offerings in the description box. We're confident that you'll find something that piques your interest!

  • @agob7921
    @agob7921 Před 9 měsíci +1

    Awesome explanation. Thank you very much!

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 9 měsíci

      We're thrilled to have been a part of your learning experience, and we hope that you feel confident and prepared to take on new challenges in your field. If you're interested in further expanding your knowledge, check out our course offerings in the description box.

  • @miguelcrtz
    @miguelcrtz Před 7 měsíci

    thank you

  • @natambabonita316
    @natambabonita316 Před rokem +1

    Thank you

  • @brookayanaw9540
    @brookayanaw9540 Před rokem +1

    it is a nice video to learn.

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před rokem

      Thank you for choosing us as your learning partner. We are thrilled to hear that you enjoyed your experience with us! If you are looking to expand your knowledge further, we invite you to explore our other courses in the description box.

  • @divinesreeram
    @divinesreeram Před rokem +1

    Wonderful explanation.👋

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před rokem

      We're so glad that you enjoyed your time learning with us! If you're interested in continuing your education and developing new skills, take a look at our course offerings in the description box. We're confident that you'll find something that piques your interest!

  • @aaronkillen1936
    @aaronkillen1936 Před 8 měsíci

    Exceptional explanation

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 8 měsíci

      We're so glad that you enjoyed your time learning with us! If you're interested in continuing your education and developing new skills, take a look at our course offerings in the description box. We're confident that you'll find something that piques your interest!

  • @moshewolfsonfinance
    @moshewolfsonfinance Před 7 měsíci

    Thanks. Great video

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 6 měsíci

      WooHoo! We are so happy you love our videos. Please do keep checking back in. We put up new videos every day on all your favorite topics Have a good day!

  • @prathameshthakare6502
    @prathameshthakare6502 Před 2 lety +1

    Nicely Explained!!

  • @adhithpranav6986
    @adhithpranav6986 Před 6 měsíci

    Thank You

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 6 měsíci

      WooHoo! We are so happy you love our videos. Please do keep checking back in. We put up new videos every day on all your favorite topics Have a good day!

  • @mrrishiraj88
    @mrrishiraj88 Před 3 lety +1

    🙏

  • @kushchopra4300
    @kushchopra4300 Před 3 lety +1

    Nice

  • @purplecrayon7281
    @purplecrayon7281 Před 23 dny

    Hashing still doesn't protect brute force attack, i.e. randomly guessing the password from the user end. If a user password is weak, e.g. password123, hashing wouldn't help at all.

  • @uba1dx
    @uba1dx Před rokem +1

    Hashing algorithm?

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před rokem

      We're thrilled to have been a part of your learning experience, and we hope that you feel confident and prepared to take on new challenges in your field. If you're interested in further expanding your knowledge, check out our course offerings in the description box.

  • @user-ko2zv6dg1b
    @user-ko2zv6dg1b Před rokem +1

    Hashing definitions send

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před rokem

      Hashing is a process of using a hash function to convert input data into a fixed-size hash code. The hash function takes the input and produces a unique hash value. It should be deterministic, meaning the same input always generates the same hash. The hash values should be evenly distributed across the possible range and should be computationally difficult to reverse-engineer the original input from the hash code.
      For example, when hashing the string ""Hello, World!"" using a specific hash function, it might produce a hash code like ""7FA120CC"". This hash code will consistently be generated for the same input.
      Hashing is widely used in computer science for tasks like data indexing, retrieval, password storage, and cryptography. It allows for efficient data comparison and identification without storing or comparing the entire input.

  • @nicholashartmann4525
    @nicholashartmann4525 Před rokem +1

    Humongous 😅

  • @tsunningwah3471
    @tsunningwah3471 Před 5 měsíci

    堆無聊