π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Data security is a top priority for businesses and individuals alike. With cyber threats evolving, keeping sensitive information secure has never been more critical. But when it comes to securing data, terms like “Encryption” and “Hashing” often come u…


This content originally appeared on DEV Community and was authored by Shahzaib Haider

Data security is a top priority for businesses and individuals alike. With cyber threats evolving, keeping sensitive information secure has never been more critical. But when it comes to securing data, terms like "Encryption" and "Hashing" often come up. Although these techniques are both essential for data protection, they work in very different ways.

What is Encryption?

Encryption is a process that transforms readable data, known as plaintext, into an unreadable format called ciphertext. This transformation makes data indecipherable to unauthorized users. Only those with the correct "key" can convert ciphertext back into plaintext, restoring the data to its original, readable form.
Symmetric Encryption: a single key used to both encrypt and decrypt data.
Asymmetric Encryption: a pair of keys: one for encryption and another for decryption.

What is Hashing?

Unlike encryption, hashing is a one-way process. Hashing transforms data into a fixed-length string of characters, commonly called a hash or hash value. Once data is hashed, it cannot be reverted to its original form, making hashing ideal for verifying data integrity rather than data confidentiality.

How Hashing Works

Hashing uses mathematical functions to produce a unique hash value based on the input data. Even a small change in the input creates a drastically different hash, which is essential for detecting alterations in the data. Popular hashing algorithms include MD5, SHA-1, and SHA-256.

Common Misconceptions about Encryption and Hashing

To clear up any confusion, let’s address some common myths around encryption and hashing:

  1. Myth: Hashing is a form of encryption.
    Truth: Hashing does not conceal data like encryption. It simply generates a fixed representation (hash) of the original data.

  2. Myth: Encryption is always better than hashing.
    Truth: Encryption and hashing serve different purposes. Each is valuable depending on the context and security needs.

  3. Myth: A hash can be "decrypted."

Truth: Hashes are irreversible, meaning you cannot recover the original data from the hash. This is why hashing is often used for password storage.

That’s it for now, Stay tuned.


This content originally appeared on DEV Community and was authored by Shahzaib Haider


Print Share Comment Cite Upload Translate Updates
APA

Shahzaib Haider | Sciencx (2024-11-02T20:58:52+00:00) π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒. Retrieved from https://www.scien.cx/2024/11/02/%f0%9d%96%a4%f0%9d%97%87%f0%9d%96%bc%f0%9d%97%8b%f0%9d%97%92%f0%9d%97%89%f0%9d%97%8d%f0%9d%97%82%f0%9d%97%88%f0%9d%97%87-%f0%9d%96%ba%f0%9d%97%87%f0%9d%96%bd-%f0%9d%96%a7%f0%9d%96%ba%f0%9d%97%8c/

MLA
" » π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒." Shahzaib Haider | Sciencx - Saturday November 2, 2024, https://www.scien.cx/2024/11/02/%f0%9d%96%a4%f0%9d%97%87%f0%9d%96%bc%f0%9d%97%8b%f0%9d%97%92%f0%9d%97%89%f0%9d%97%8d%f0%9d%97%82%f0%9d%97%88%f0%9d%97%87-%f0%9d%96%ba%f0%9d%97%87%f0%9d%96%bd-%f0%9d%96%a7%f0%9d%96%ba%f0%9d%97%8c/
HARVARD
Shahzaib Haider | Sciencx Saturday November 2, 2024 » π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒., viewed ,<https://www.scien.cx/2024/11/02/%f0%9d%96%a4%f0%9d%97%87%f0%9d%96%bc%f0%9d%97%8b%f0%9d%97%92%f0%9d%97%89%f0%9d%97%8d%f0%9d%97%82%f0%9d%97%88%f0%9d%97%87-%f0%9d%96%ba%f0%9d%97%87%f0%9d%96%bd-%f0%9d%96%a7%f0%9d%96%ba%f0%9d%97%8c/>
VANCOUVER
Shahzaib Haider | Sciencx - » π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2024/11/02/%f0%9d%96%a4%f0%9d%97%87%f0%9d%96%bc%f0%9d%97%8b%f0%9d%97%92%f0%9d%97%89%f0%9d%97%8d%f0%9d%97%82%f0%9d%97%88%f0%9d%97%87-%f0%9d%96%ba%f0%9d%97%87%f0%9d%96%bd-%f0%9d%96%a7%f0%9d%96%ba%f0%9d%97%8c/
CHICAGO
" » π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒." Shahzaib Haider | Sciencx - Accessed . https://www.scien.cx/2024/11/02/%f0%9d%96%a4%f0%9d%97%87%f0%9d%96%bc%f0%9d%97%8b%f0%9d%97%92%f0%9d%97%89%f0%9d%97%8d%f0%9d%97%82%f0%9d%97%88%f0%9d%97%87-%f0%9d%96%ba%f0%9d%97%87%f0%9d%96%bd-%f0%9d%96%a7%f0%9d%96%ba%f0%9d%97%8c/
IEEE
" » π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒." Shahzaib Haider | Sciencx [Online]. Available: https://www.scien.cx/2024/11/02/%f0%9d%96%a4%f0%9d%97%87%f0%9d%96%bc%f0%9d%97%8b%f0%9d%97%92%f0%9d%97%89%f0%9d%97%8d%f0%9d%97%82%f0%9d%97%88%f0%9d%97%87-%f0%9d%96%ba%f0%9d%97%87%f0%9d%96%bd-%f0%9d%96%a7%f0%9d%96%ba%f0%9d%97%8c/. [Accessed: ]
rf:citation
» π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒 | Shahzaib Haider | Sciencx | https://www.scien.cx/2024/11/02/%f0%9d%96%a4%f0%9d%97%87%f0%9d%96%bc%f0%9d%97%8b%f0%9d%97%92%f0%9d%97%89%f0%9d%97%8d%f0%9d%97%82%f0%9d%97%88%f0%9d%97%87-%f0%9d%96%ba%f0%9d%97%87%f0%9d%96%bd-%f0%9d%96%a7%f0%9d%96%ba%f0%9d%97%8c/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.