Hashing vs. Encryption vs. Encoding
Hashing vs. Encryption vs. Encoding
Encoding
Identity
Integrity Confidentiality
Verification
“
So, how exactly is this done?
Hashing and Encryption are
the answers. Now you must
be thinking ‘Doesn’t that
make them the same thing?’
The answer is NO.
Hashing
Hashing - ###
▪ Let’s try to imagine life without hashing. Suppose, it’s
someone’s birthday and you decide to send a ‘Happy Birthday’
message.
▪ This could happen and you wouldn’t even know it (until you are
at the receiving end of certain reactions!).
▪ Jokes aside, Hashing ▪ Basically, a hash is a number
protects the integrity of your that is generated from the
data. It protects your data text through a hash
against potential alteration algorithm. This number is
so that your data isn’t smaller than the original
changed one bit. text.
▪ The algorithm is designed in such a way that no two hashes
are the same for two different texts. And it is impossible
(almost!) to go back from the hash value to the original text.
Let’s not get involved in the donut debate (is there a debate?) and focus on hashing for
the time being. Now if we make a tiny bit of change in the sentence above, the hash
value will change entirely. Let’s see how it goes.
See how the hash value changed entirely when we removed the ‘s’ from Donuts?
That’s what hashing does for you.
Hashing Algorithm Example
Use of Hashing
Hashing is an effective Hashing is used in Hashing can be used
method to compare Digital signatures and to find a specific piece
and avoid duplication SSL certificates. of data in big
in databases. databases.
When you send any data to an encrypted site, it is encrypted using the Public
Key. The Private Key, on the other hand, is only with the receiver and must be
kept discreet. Private Key is used to decrypt the encrypted data. The use of
two distinct keys makes the encryption process more secure and a tad slower.
Both these techniques are used in the SSL/TLS certificates. The Asymmetric
Encryption is first applied for the SSL handshake process — server validation
if you call it. Once the connection is in place between the server and the client,
Symmetric Encryption takes care of the data encryption.
Encoding
Encoding
Unlike Encryption and Hashing, Encoding is not used for
security purpose.