Encryption - Hashing
Encryption - Hashing
g
Understand
the difference
between
Hashing,
Encryption
If you think that Hashing and Encryption
are the same thing, you are wrong!
However, you’re not alone.
Internet Security
From a security point of view what are
the most important things when
sending data/message on the internet?
1
You want to let.the other person
know that the message has been sent
from you – not from anyone else.
2
. to be in
You want the message
the exact same format – without
any alteration or modification.
3
You want your .
message to be
protected from the reach of ill-
intended people – hackers, fraudsters
& other types of cyber criminals.
These three functions can be
designated as:
Identity
Integrity Confidentialit
Verification
y
“
So, how exactly is this
done? Hashing and
Encryption are the
answers. Now you must
be thinking ‘Doesn’t that
make them the same
thing?’
The answer is
NO.
Hashin
g
▪ Hashing protects the ▪ Basically, a hash is a
integrity of your data. It number that is generated
protects your data against from the text through a
potential alteration so that hash algorithm. This
your data isn’t changed number is smaller than
one bit. the original text.
▪ The algorithm is designed in such a way that no two
hashes are the same for two different texts. And it is
impossible (almost!) to go back from the hash value to the
original text.
Let’s not get involved in the donut debate (is there a debate?) and focus on hashing
for the time being. Now if we make a tiny bit of change in the sentence above, the
hash value will change entirely. Let’s see how it goes.
When you send any data to an encrypted site, it is encrypted using the Public
Key. The Private Key, on the other hand, is only with the receiver and must
be kept discreet. Private Key is used to decrypt the encrypted data. The use
of two distinct keys makes the encryption process more secure and a tad
slower.
Let’s flashback a bit
Hashing Encryption
A string of numbers A technique used to maintain
generated to confirm the the confidentiality of data by
integrity of data through converting the data into an
hashing algorithms. undecipherable format.