Hello,
What is the difference between Hashing and encryption.
is it correct that confidentiality means that just the owner can access the data?
Thanks,
Marco
Hello,
What is the difference between Hashing and encryption.
is it correct that confidentiality means that just the owner can access the data?
Thanks,
Marco
Hashing one way. So you can turn Marco into ASDKJDFSKJSADGFL for example but it can't be turned back into Marco.
Encryption is two-way. So you can turn Marco into ASDKJDFSKJSADGFL for example but using specific maths you can turn ASDKJDFSKJSADGFL back into Marco.
Confidentiality means limiting access to data to only authorized people. So only certain people can see you actual email address in the system, where I can't see your email address.
Hashing is a mathematical way to insure the integrity the source data. When you take the source data and you run it through a hashing algorithm. It produces a fixed length hash value. This value is unique. If I send you data. How do you know that data you received hasn't been manipulated or changed? I send you the data and hash value. If you can take the data received and run it through the same hashing algorithm...you should be able to match the hashed value you generated with the hash value I sent. If it's the same...then the data has remained the same. That is its purpose.
Encryption is mean to change the data into something that is hidden by a secret key and encryption algorithm. It also can be decrypted by a secret key and encryption algorithm. Its goal is to make sure that only the key holder can decrypt the encrypted data.
Confidentiality is goal of security, just as @SIMON-TAPLIN described. It is about privacy and keeping things private. We can attempt to do that by using encryption, authentication, authorization and accountability.
Cordially,
Ronnie Wong
Edutainer Manager, ACI Learning [ITPRO]
*if the post has answered the question, mark as solved.
**All "answers" and responses are offered "as is" and my opinion. There is no implied service, support, or guarantee by ITProTV.
Another key difference is running a document through a hashing algorithm doesn't provide confidentiality, only integrity.
For example, if you run a file through a hashing algorithm, you will get a hash value as a result, that can be used to determine if the file has been modified in the future (integrity). But the original file is unchanged, still plain text, human readable (no confidentiality).
If you run a file through an encryption algorithm, the file is changed. It is no longer plain text, it is now cipher text, not human readable (confidentiality). You will need to decrypt the file to read the data.
Mike Rodrick
Edutainer, ITProTV
**if the post above has answered the question, please mark the topic as solved.