0% found this document useful (0 votes)
67 views

Encryption - Hashing

Hashing and encryption are different but related security techniques. Hashing protects data integrity by generating a unique string, or hash value, to verify data has not been altered. Encryption protects data confidentiality by encoding data using cryptographic keys so it can only be read by authorized parties. Key differences are that hashing is one-way while encryption uses keys to both encrypt and decrypt, and hashing verifies integrity while encryption maintains confidentiality.

Uploaded by

Anggri Yulio
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views

Encryption - Hashing

Hashing and encryption are different but related security techniques. Hashing protects data integrity by generating a unique string, or hash value, to verify data has not been altered. Encryption protects data confidentiality by encoding data using cryptographic keys so it can only be read by authorized parties. Key differences are that hashing is one-way while encryption uses keys to both encrypt and decrypt, and hashing verifies integrity while encryption maintains confidentiality.

Uploaded by

Anggri Yulio
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Encryption Hashin

g
Understand
the difference
between
Hashing,
Encryption
If you think that Hashing and Encryption
are the same thing, you are wrong!
However, you’re not alone.
Internet Security
From a security point of view what are
the most important things when
sending data/message on the internet?
1
You want to let.the other person
know that the message has been sent
from you – not from anyone else.
2
. to be in
You want the message
the exact same format – without
any alteration or modification.
3
You want your .
message to be
protected from the reach of ill-
intended people – hackers, fraudsters
& other types of cyber criminals.
These three functions can be
designated as:

Identity
Integrity Confidentialit
Verification
y

So, how exactly is this
done? Hashing and
Encryption are the
answers. Now you must
be thinking ‘Doesn’t that
make them the same
thing?’
The answer is
NO.
Hashin
g
▪ Hashing protects the ▪ Basically, a hash is a
integrity of your data. It number that is generated
protects your data against from the text through a
potential alteration so that hash algorithm. This
your data isn’t changed number is smaller than
one bit. the original text.
▪ The algorithm is designed in such a way that no two
hashes are the same for two different texts. And it is
impossible (almost!) to go back from the hash value to the
original text.

▪ It’s kind of like a cow moving on stairs – it can move


upstairs but not down!! Anyway, looping back to our
“happy birthday” message.

▪ At that point, they’ll know the message has been tampered


with.
▪ That’s one of the most indispensable properties of
Hashing—its uniqueness. There cannot be the same hash
value for different text.

▪ Even the tiniest bit of change/modification will alter the


hash value completely. This is called the Avalanche Effect.

▪ Let’s understand this with an example. In the below


example, we have applied the SHA-1 algorithm. Let’s see
how it goes.
Text: Everybody loves donuts

SHA-1 Hash value of the text above:


daebbfdea9a516477d489f32c982a1ba1855bcd

Let’s not get involved in the donut debate (is there a debate?) and focus on hashing
for the time being. Now if we make a tiny bit of change in the sentence above, the
hash value will change entirely. Let’s see how it goes.

New text: Everybody loves donut.

SHA-1 Hash value of the new text:

8f2bd584a1854d37f9e98f9ec4da6d757940f388 See how the hash value changed

entirely when we removed the ‘s’ from Donuts?


That’s what hashing does for you.
Hashing Algorithm Example
Use of Hashing
 Hashing is an  Hashing is used in  Hashing can be used
effective method to Digital signatures to find a specific
compare and avoid and SSL certificates. piece of data in big
duplication in databases.
databases.
Encryption
 It’s almost impossible to imagine the internet
without Encryption.

 Encryption is what keeps the artificial world of the internet


secured. Encryption keeps data secured and confidential.

 Fundamentally, it is the process of transforming your


confidential data into an unreadable format so that no hacker
or attacker can manipulate or steal it.
Encryption & Decryption
 The encryption of data is executed through cryptographic keys.
The information is encrypted before it’s sent and decrypted by
the receiver. Therefore, the data is safe when it is “in the air.”

 Based on the nature of the keys, encryption can be classified


into two main categories – symmetric encryption, asymmetric
encryption.
Encryption Types
Symmetric Encryption Asymmetric Encryption

In symmetric encryption, Asymmetric encryption is a


the data is encrypted and relatively new technique
decrypted using a single compared to its counterpart.
cryptographic key. It It involves the use of two
means that the key used different keys, one for
for encryption is used for encryption and one for
decryption as well. decryption purposes. One key
is known as a ‘Public Key’
and the other is regarded as a
‘Private Key.’
Symmetric
Encryption
Asymmetric Encryption
 The Public Key is virtually everywhere. Even you possess it without even
knowing it. One is stored in your web browser every time you visit an
HTTPS- enabled website.

 When you send any data to an encrypted site, it is encrypted using the Public
Key. The Private Key, on the other hand, is only with the receiver and must
be kept discreet. Private Key is used to decrypt the encrypted data. The use
of two distinct keys makes the encryption process more secure and a tad
slower.
Let’s flashback a bit
Hashing Encryption
A string of numbers A technique used to maintain
generated to confirm the the confidentiality of data by
integrity of data through converting the data into an
hashing algorithms. undecipherable format.

You might also like