Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn
⏰ Timestamps for content in this video ⏰
00:00 Recap of cryptographic hash functions
01:31 Using MD5 in Python
03:42 Using SHA-1 in Python
04:12 Using SHA-256 in Python
04:46 Using SHA-3-512 in Python
05:15 Demonstrating the insecurity of MD5 with Python
07:37 Demonstrating the insecurity of SHA-1 with Python
09:38 Demonstrating the improvement of SHA-256 over MD5 and SHA-1 with Python
🔷🔷 About 🔷🔷
This Fundamental Cryptography in Theory and Python lesson presents, how the hash functions MD5, SHA-1, SHA-2 and SHA-3 can be used in Python, and demonstrates, why MD5 and SHA-1 are considered insecure hash functions.
All code demonstrated serves educational purposes only.
📝 Resources used and created for code lessons 📝
https://github.com/cgossi/fundamental_cryptography_with_python