rumana2 - PowerPoint PPT Presentation

About This Presentation
Title:

rumana2

Description:

Hashing, encryption, encoding, and salting, all four are used for maintaining data security at some point. But, are you facing severe difficulties about when to use which one? I know hashing, encryption, encoding and salting can be quite confusing at times. Therefore, you must understand the right utilization and mechanism of each phenomenon. Then hashing vs encryption vs encoding vs salting will be crystal clear. This piece of writing will help you in learning the purpose of why they exist. And which algorithms to use for which purpose, and what differentiates them from each other. – PowerPoint PPT presentation

Number of Views:21
Slides: 19
Provided by: rumana2

less

Transcript and Presenter's Notes

Title: rumana2


1
All You Need To Know About Hashing, Encryption,
Salting Encoding
-ADITI L
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
2
Encoding, encryption, hashing, salting Hashing,
encryption, encoding, and salting, all four are
used for maintaining data security at some point.
But, are you facing severe difficulties about
when to use which one? I know hashing,
encryption, encoding and salting can be quite
confusing at times. Therefore, you must
understand the right utilization and mechanism of
each phenomenon. Then hashing vs encryption vs
encoding vs salting will be crystal clear. This
piece of writing will help you in learning the
purpose of why they exist. And which algorithms
to use for which purpose, and what differentiates
them from each other.
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
3
What is Encryption? Encryption is converting data
from one format to another to conceal data. The
process ensures that the intended recipient
receives the transmitted data. Encryption
implements through Caesar shift or stream cipher.
Caesar shift is a kind of substitute for cipher
where each letter of a given text has to replace
by a letter with some set random numbering to the
letters. For example, with a shift of 3 to the
right in alphabets word B will become E. A
stream cipher is an encryption algorithm that
divides the plaintext into small blocks, either
one bit or one byte long. After that, it encodes
each block depending on many previous
blocks. Both methods have several uses depending
on whether you need speed or security.
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
4
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
5
  • Types of Encryption Algorithms DES/3DES or
    TripleDES, Blowfish, AES ,Twofish
  • Benefits of Encryption
  • Integrity Prove that it is not risky while
    sending the content information.
  • Authentication the source of a message can be
    verified.
  • Nonrepudiation the sender of data cannot refuse
    to send it.
  • Common Vulnerability of Encryption If the
    attacker can gain a copy of your encryption key,
    then the individual can easily decrypt your
    message. Again if we compare Hashing vs
    Encryption, Hashing is always a step ahead.
    Encryption is a two-way function that includes
    encrypting and decrypting. But, hashing is only
    one function that changes a plain text into a
    unique digest which is irreversible.

https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
6
What is Hashing? Hashing is converting a string
of characters such as letters, numerals or
symbols by applying a mathematical formula. And
transform it into a short fixed-length value
called a key. The hash key is the product of
the original string. The hash function started
from the concept of generating a hash which is a
mixed-up variant of the original value. You can
also apply hashing in various encryption methods.
Hashing is much more suitable for indexing and
retrieving items from a database. The time
required to find the original value longer when
compared to the time needed while using the
hashed key. Hashes are inherently unidirectional,
so this makes hashing an excellent way to store
passwords in the database. It is very difficult
to access the raw data or to invert it into its
original form. As the stored passwords in hash
format, to access raw data to invert it into its
original form.
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
7
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
8
  • Types of Hashing Algorithms RIPEMD ,WHIRLPOOL
    ,TIGER ,HMAC-SHA256 ,PBKDF2
  • Uses of Hashing
  • Hashing is an effective method to analyze and
    avoid duplication in databases.
  • Hashing can be used to find a particular piece of
    data in big databases.
  • It is used in SSL certification.
  • It is broadly used in computer graphics.
  • Common Vulnerability of HashinG The most common
    way for attackers to detect the original string
    is to run a random set of characters on the
    algorithm by which the hash was created. It would
    be impossible when hashing is performed securely.

https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
9
Hashing vs Encryption The prime difference
between encryption and hashing is that the entire
process is based upon a key system. Without the
specified key, the encrypted message cant be
unencrypted. If decrypting the resulting data is
necessary, then encryption should only be
employed instead of hashing. Let us assume that
if you want to send a piece of secure information
to someone in a discreet manner. Encryption is
the best way to secure your data compared to
hashing. As the transmitted data is of no use to
the recipient if they cannot decrypt it. If the
information you sent is restricted to be
identified for any application to work on. At
that instant hashing should be chosen over
encryption. While weighing hashing vs encryption,
hashing is more reliable and secure. It protects
your data against potential alterations so that
your data isnt changing one bit. A hash is a
number that generates from a text through a hash
algorithm. This number is smaller than the
original text.
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
10
What is Salting? If you understand what hashing
is, this will make it much easier for you to
understand salting. Salting is generally related
to hashing and making passwords more secure in
the process of hashing. It is a unique value that
may be a text, numerals, symbols or combinations
of them, which are added to the end of the
password before it is hashed to generate a
different hash value. This certainly adds an
additional layer of protection to the hashing
method, particularly against cyber brute force
intrusions. A computer network or botnet
generates a brute force attack to crack the
passwords. It is a trial or error which runs in
every imaginable combination of letters and
numbers to recognize the right combination by the
attacker. Far more salt is the end product of
salting which gets by salting. Salt can be
anything letters or numerals. The concept relates
to the fact that by adding salt to the password
in any manner and later hashing it, you have
minimum brutal force attack from cracking
passwords easily.
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
11
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
12
  • Types of Salting Algorithms
  • Argon2
  • Scrypt
  • Bcrypt
  • PBKDF2
  • Benefits of Salting
  • Salts protect against hash tables.
  • Salts make it more complicated and slower for
    brute-force attacks and dictionary attacks for
    cracking the passwords.
  • Common Vulnerability of Salting Using a less
    secure or predictable salt can lead to a hack. To
    make that impossible, we could use different ways
    of hashing with salt. Simple salt is like hash
    (passwordsalt), but we can make it more
    complicated like hash(saltpasswordsalt) and
    many other formats.

https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
13
What is Encoding? Encoding modifies data from one
format into another format using a scheme that is
publicly available. So, that it can easily
restore back into the predefined data. It does
not need any key to decode it, unlike the above
functions mentioned. You need only the algorithm
which accounts for its encoding. Therefore the
only difference between encoding and encryption
is that encoding does not require a key. But,
only the algorithm used to encode it. Yet
encryption requires a key to reverse the content
into plain text. A prevalent example of encoding
would be Morse code. Individuals who do not know
Morse code may not understand the message or even
realize they have new messages. But, with a small
amount of research, the information could be read
and understand as well. Encoding is used when
confidentiality is not your highest priority, but
you still want it to be there. Therefore you
require a fast method of obscuring information.
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
14
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
15
Types of Encoding Methods ASCII ,Unicode, URL
Encoding, Base64 Advantages of EncodinG Less
storage space, Speeding up data entry ,Increase
the accuracy of data entry ,Faster searching for
data Common Vulnerability of Encoding The only
drawback of encoding is that anyone with a little
time on their hands will be able to analyze the
protected message.
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
16
But what is the main difference between
Encoding, Encryption, Hashing, and Salting? As
weve gone through all the aspects of encryption,
hashing, salting, and encoding. Its time for us
to get back to the fundamental differences, so
that would be easy for you to understand. While
every process here is related to one another,
they each toil for a distinct purpose. While
encoding is a code to change into the original
data form for the external process. Therefore,
you should not confuse encoding with encryption.
Encryption hides the content and whereas hashing
is an algorithm by making use of which you can
verify data integrity.
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
17
Encryption is a means of encoding data while
protecting its integrity. Encrypted data can only
be decrypted by those who have the correct key to
retain it into its original form. Encryption
algorithms can be easy to reverse the data. It
renders us a way to keep it away from intruders
but still be able to get it when it is much
needed. It is extensively used to keep everyone
safe online, by performing a vital role in the
online security protocols. A protocol holds
users data safe and secure when it is collected
and also while in transition. Why hashing is the
more secure procedure? In contradiction to
hashing vs encryption vs encoding, hashing is
simply a one-way process. Cryptographic hash
functions have numerous attributes that allow us
to validate the integrity and authenticity of the
data. Such as through authentication codes and
digital signatures. Particular types of hash
functions are also utilized to store passwords.
Storing a passwords hash rather than a raw form
gives us an extra layer of protection. It means
that if any intruder who obtains access to this
database, cant have quick hands-on original
passwords.
https//www.audienceplay.com/blog/hashing-vs-encry
ption-vs-salting-vs-encoding/
18
While hashing passwords do make life more
challenging for hackers, it can still be
bypassed. This is where we start adding salt.
Salting adds data called as salt to the passwords
before they have been hashed. This would make
attacks more resource-heavy, complicated and
time-consuming. By using passwords and salts,
ideally, we can make rainbow tables and hash
tables impossible to attack. Altogether,
encryption, hashing, salting, and encoding are
all crucial aspects of having everyone safe
online. Without these methods hackers would have
a free-for-all with your data, leaving you with
no security on the web.
https//www.audienceplay.com/
Write a Comment
User Comments (0)
About PowerShow.com