SHA2's weakness explained by Dr Mike Pound -- Check out Brilliant's courses and start for free at (episode sponsor) -- More links in full description below ↓↓↓ SHA2 is susceptible to a length extension attack, meaning supposedly secure messages can be added to and still pass certain security tests. Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: This video was filmed and edited by Sean Riley. Computerphile is a sister project to Brady Haran's Numberphile. More at











