Encryption#Encoding#Hashing

What is Encryption, Encoding and Hashing, just collected from various sources may be this will help in understating the basics?

Encryption: ??

High-level points to noted:?

  • Encryption is a type of encoding technique where the message is encoded using an encryption algorithm so that only authorized persons can access that information.?
  • Encryption is a technique used for protecting the confidentiality of the data.?
  • Appropriate Keys are used in the Encryption.?
  • Encryption can be reversed back to its original form by using appropriate keys?

Algorithms used:?

AES Algorithm?

RSA Algorithm?

Diffie Hellman?

Encoding: ?

High-level points to noted:?

  • Encoding is a technique where the data is transformed from one form to another.?
  • Encoding is used for preserving the usability of the data?
  • No Keys are used in Encoding.?
  • Encoding can be reversed back to its original form.?

Formats are: ?

BASE64 ?

UNICODE ?

ASCII?

URL Encoding.?

Hashing?

In Hashing, data is converted to the hash using some hashing function, which can be any number generated from a string or text. Various hashing algorithms are MD5 and SHA256. Data once hashed is non-reversible. The data structure hash table is used for storing data.?

?Example: When you send pictures and text messages over WhatsApp over Stack Overflow (posting in questions), images are sent to different servers, and text is sent to a different server for efficiency purposes. So, for verifying images that the images are not tampered with between data transfers over the internet, a hashing algorithm like MD5 can be used. MD5 generates a message digest of 128 bits, while SHA1 generates a message digest of the 160-bit hash value.?

?High-level points to noted:?

  • Hashing is a technique where the data is converted to hash using different algorithms present there.?
  • Hashing is simply used for checking the integrity of the data?
  • The hashed one cannot be reversed back to its original form.?

Algorithms are:?

MD5 ?

SHA256?

SHA – 3.?

要查看或添加评论,请登录

Praveen Koppala的更多文章

社区洞察

其他会员也浏览了