Комментарии:
Sir, to be honest. Thanks for this video You are awesome. Loved your video.
ОтветитьGood explanation of password hashing. BUT: You must never ever use MD5 for this in a real application. MD5 was broken decades ago. And you can easily brute force MD5 hashed passwords.
Always use slow hashing functions such as bcrypt, scrypt or argon2!
Wow this helped me so much thank you! I love that you gave a background on MD5 and the explanation of what hashing is.
Ответитьits not a reading competition that you just go on reading whats writtern!! Rather you must be explaning it.
ОтветитьNice video. Interesting that sub blocks were denoted M0, M1, M2 etc. But the constant arrays denoted T1, T2, T3 etc. (starting 1, rather than 0)
ОтветитьNo plain text can be stored in this way,
Prevent owner from sniffing user data, and protecting user privacy in the unfortunate event of sata breach or hack
cool
ОтветитьIn this presentation you need explain at least one example with actual calculation...So that it will more clear
Ответить🙌🙌🙌🙌🙌🙌🙌🙌🙌🙌
ОтветитьSir,
Every time hash function generates a different digest value than how it match with pre- generated value stored in database?exp ,password for login store in db in digest form.
First
ОтветитьSir,what is time complexity of MD5
Ответить