Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings.
EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U
Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg
http://www.facebook.com/computerphile
Tweets by computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com