1 00:00:00,830 --> 00:00:08,090 All right, so here you can see that I'm on this website, Tools for new Starcom, I know this website 2 00:00:08,090 --> 00:00:12,620 name is very funny, but apparently that's the best hashing tool do right now. 3 00:00:13,430 --> 00:00:15,740 So let's calculate the hash. 4 00:00:15,740 --> 00:00:18,920 Let's start with MI five, which we have seen. 5 00:00:19,850 --> 00:00:22,910 So let's say I want to write. 6 00:00:23,210 --> 00:00:25,790 I love cyber. 7 00:00:27,270 --> 00:00:28,200 Security. 8 00:00:28,230 --> 00:00:35,220 All right, I love cyber security, not that I have. 9 00:00:35,760 --> 00:00:38,140 You know, what I've written is Somalia. 10 00:00:38,150 --> 00:00:38,970 It's Lorqess. 11 00:00:38,970 --> 00:00:42,110 And now let's see, I hash this, OK? 12 00:00:42,720 --> 00:00:45,030 You can see this is the hash resiled. 13 00:00:45,090 --> 00:00:46,910 OK, this is the hash. 14 00:00:46,920 --> 00:00:47,380 What is it? 15 00:00:48,030 --> 00:00:51,600 Just keep in mind about this has risen because we are going to need it. 16 00:00:51,900 --> 00:00:54,240 One F seven C five. 17 00:00:54,240 --> 00:00:54,760 One five. 18 00:00:54,790 --> 00:00:57,000 You have to remember this all. 19 00:00:57,000 --> 00:00:58,140 You can shoot it down. 20 00:00:58,140 --> 00:01:00,330 I love it for a couple of seconds. 21 00:01:04,760 --> 00:01:14,060 All right, now what I do is separate cyber and security and now let us see if the hash value changes. 22 00:01:15,480 --> 00:01:23,020 Of course, it has changed, you can see it has changed, the hash value has changed. 23 00:01:23,400 --> 00:01:26,280 So if you see this hash value you. 24 00:01:28,540 --> 00:01:38,390 One five seventy five, and if I give a speech are right here, the hash value is completely changed. 25 00:01:39,730 --> 00:01:43,240 So this is the hash. 26 00:01:43,250 --> 00:01:50,500 So even if you change one single bit, the entire value is going to change. 27 00:01:50,530 --> 00:01:50,950 OK. 28 00:01:52,690 --> 00:01:56,800 Another to say, I write, I want. 29 00:01:57,890 --> 00:01:59,090 To loan. 30 00:02:00,260 --> 00:02:07,670 Cryptography, I won't learn cryptography now you can see this hash value the length of this hash value, 31 00:02:08,000 --> 00:02:12,040 there is not as a two as the two. 32 00:02:12,050 --> 00:02:15,640 So you can see these are the number of hash. 33 00:02:15,650 --> 00:02:16,520 Who Ghadames. 34 00:02:16,910 --> 00:02:20,240 Let's go to a set of two, which is two fifty six. 35 00:02:20,720 --> 00:02:21,910 And let's hash this. 36 00:02:22,820 --> 00:02:25,210 Just see the hash. 37 00:02:25,700 --> 00:02:28,970 OK, just see the length of this hash. 38 00:02:29,490 --> 00:02:35,480 All I do is again I write I and again I'll hash this. 39 00:02:36,510 --> 00:02:46,230 It's going to change, right, and even let's see, I copy all this and irrespective of my input, irrespective 40 00:02:46,230 --> 00:02:53,130 of my input, the length of the input output is going to remain the same length. 41 00:02:53,820 --> 00:03:00,720 This is one of the most important properties of hash that irrespective of whatever length of input you 42 00:03:00,720 --> 00:03:05,020 give, the hash output is always going to be a fixed length. 43 00:03:05,490 --> 00:03:11,520 So as you can see, even if I remember this, even if I remove this, I'm sorry, the hash is going 44 00:03:11,520 --> 00:03:12,120 to teach. 45 00:03:13,010 --> 00:03:14,420 So this is how. 46 00:03:15,800 --> 00:03:23,120 Attackers, you know, carry out hashish and now you might ask a question, if you already have MI5 47 00:03:23,120 --> 00:03:25,850 in place, why do I need a city to physics? 48 00:03:26,570 --> 00:03:32,300 Well, even attackers can have a brute force attack and find out both attacks. 49 00:03:32,300 --> 00:03:39,980 But the more and the greater the length of the hash, the greater the size of the Indian got them, 50 00:03:40,490 --> 00:03:43,460 the more it gets difficult to crack the hatch. 51 00:03:43,490 --> 00:03:52,240 And as such, it is almost impossible to crack because no one has yet cracked a city to look at them. 52 00:03:52,880 --> 00:04:00,950 You're not going to dive deep into the algorithm because it's a lot of technical and mathematical. 53 00:04:01,280 --> 00:04:08,390 And since the scores is for people who want to get an overview of information security, I suggest that 54 00:04:08,390 --> 00:04:10,470 this is more than enough. 55 00:04:10,490 --> 00:04:10,880 All right. 56 00:04:11,150 --> 00:04:17,280 And so this was the practical or you can call a fun lab for hashing. 57 00:04:17,570 --> 00:04:23,900 Apart from that, you will never be asked to write the algorithm for all you have to do is go through 58 00:04:23,900 --> 00:04:25,940 different types of hashing algorithms. 59 00:04:26,510 --> 00:04:33,230 And if you need anything, if you need help in learning these algorithms just posted in the Onion section, 60 00:04:33,230 --> 00:04:36,520 I'd be very happy to help you out. 61 00:04:36,920 --> 00:04:37,370 All right. 62 00:04:37,640 --> 00:04:42,800 In the next lecture will again talk with some important concepts like digital signatures. 63 00:04:42,800 --> 00:04:46,090 So the authority and articles are necessary. 64 00:04:46,340 --> 00:04:47,490 So stay tuned. 65 00:04:47,750 --> 00:04:49,240 You are doing a great job. 66 00:04:49,250 --> 00:04:53,780 You're almost going to finish this wonderful section of cryptography.