Hash Functions & Hashing

This video steps through how hashing works , what it's used for and why it's really important as a supporting process for many other areas of tech. It also explains a critical MD5 vulnerability vs something more secure like SHA2-256.

https://marc-stevens.nl/research/papers/MTh%20Marc%20Stevens%20-%20On%20Collisions%20for%20MD5.pdf

https://natmchugh.blogspot.com/2015/02/create-your-own-md5-collisions.html

https://www.sentinelone.com/cybersecurity-101/hashing/

Complete and Continue