Encryption vs Cryptographic Hash - Friday Minis 36

preview_player
Показать описание
How is data stored in high-security applications? What are the different techniques available and under what situations are they used? We explore two such examples in today's episode of Friday Minis!

= Intro Track Adapted From =
Licensed under Creative Commons: By Attribution 3.0
ISRC: USUAN120010
Рекомендации по теме
Комментарии
Автор

Explained in simple terms..very useful

chethangopalakrishna
Автор

Just finishing up for my CISSP exam and this is the best explanation I have come across so far!

I finally understand now why the message digest (produced by the hash) is encrypted with a private key. I could never understand before why the whole message isn't hashed and transmitted.

Thank you my man, thank you very much!

Ryebanana
Автор

Best explanation I have ever heard. Keep it up.

apilot
Автор

Hi,
If multiple inputs can have the same hash output, then how is it suitable for password storing and matching against the hash?

chandraganeshs
Автор

learned something :) would love to know more about the process or some types of each!

RevenTr
Автор

I just had a try at making my own hash algorithm.
I think it's alright but doesn't have anything on MD5.
But I'm using it on Nintendo 3DS where Nintendo has 10 levels of encryption on everything anyway.

ColeslawProd