Bastaki News
  • Home
  • News
  • Social
  • Web
  • Citizen Reports
Log In Sign Up
  1. Home
  2. Social Posts
  3. Post from Computerphile
Computerphile

@Computerphile

View Original

SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile

SHA2's weakness explained by Dr Mike Pound -- Check out Brilliant's courses and start for free at https://brilliant.org/computerphile/ (episode sponsor) -- More links in full description below ↓↓↓

SHA2 is susceptible to a length extension attack, meaning supposedly secure messages can be added to and still pass certain security tests.

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile

This video was filmed and edited by Sean Riley.

Computerphile is a sister project to Brady Haran's Numberphile. More at https://www.bradyharanblog.com

Post media
Sep 23, 2025 0 0 0
Upvote 0 Downvote
Share:
0 Community Comments

Comments 0

Log in to post a comment.

No comments yet. Be the first to comment!

Platform Info
YouTube

Post from Computerphile on September 23, 2025

Likes 0
Shares 0
Comments 0
View Original Post
More from Computerphile
  • How Computers Store Data Serially - Computerphile Computer…
    Oct 21, 2025 YouTube
  • How Sora2's AI Video Generator Can Clone You - Computerphil…
    Oct 16, 2025 YouTube
  • Network Layers Model (Networking Basics) - Computerphile "…
    Oct 09, 2025 YouTube
  • What is Bootstrapping Anyway? - Computerphile Where does i…
    Oct 01, 2025 YouTube
  • Coding a SHA2 Length Extension Attack - Computerphile Mike…
    Sep 25, 2025 YouTube
Advertise with Us

Reach our audience with your ads

Bastaki News

Aggregating news and social media content from around the world

Become a Reporter Add RSS Feed
Links
  • About
  • Contact
  • Privacy
  • Terms
  • FAQ

© 2025 Bastaki News. All rights reserved.

Developed by Bastaki