logo

Hashing and Encryption Security Mechanism

4 Pages675 Words399 Views
   

Added on  2023-03-31

About This Document

This document discusses the hashing security mechanism and its relationship to encryption. It explains how hashing is used to ensure the safety of message communication and how encryption turns data into incomprehensible characters. The document also highlights the importance of combining hashing and encryption to enhance the security of a website.

Hashing and Encryption Security Mechanism

   Added on 2023-03-31

ShareRelated Documents
Running head: HASHING AND ENCRYPTION SECURITY MECHANISM
Hashing and Encryption Security Mechanism
Name of the Student:
Name of the University:
Hashing and Encryption Security Mechanism_1
1HASHING AND ENCRYPTION SECURITY MECHANISM
Describe the hashing security mechanism and its relationship to the
encryption mechanism
In terms of security mechanism, hashing is generated standards from string of text by
means of numerical functions. Lennox and Holmberg (2017) discussed that hashing is a method
to facilitate the safety throughout development of messages communication at the time the
messages are to be intended for recipient only. Zhang et al., (2017) stated that hashing is used to
an index as well as retrieve the items into the database as it is a faster way to find the items by
means of shorter hashed key as compared to uncover it by means of creative values. Hashing is a
method to accumulate passwords as hashes are to be in one direction of environment. By storage
of passwords into the hash format, then it is critical for somebody with access to unprocessed
data to overturn it. In other word, hashing is foundation of secured storage of passwords. The
hash algorithm is used for mapping out data of the unsystematic dimension to data of the fixed
size. Hash values, codes as well as hash sums are to be coming back by the functions throughout
hashing. Mainly, hashing is utilized as cryptographic applications such as digital signature.
Encryption mechanism is used to turn data in series of incomprehensible characters
which are not of fixed length. There is a key differentiation between encryption as well as
hashing is that encryption mechanism strings are reversed back in innovative decrypted form if it
has right key. There are two types of encryption mechanism such as public in addition to
symmetric key encryption (Boubiche et al., 2016). Into the symmetric key encryption, key is
utilized to encrypt as well as decrypt. On the other hand, public key encryption is utilized where
one key is used to encrypt string (public key) as well as one to decrypt private key. Encryption is
used over hashing security mechanism when it is required for decrypting resulted messages. At
Hashing and Encryption Security Mechanism_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Exchanging of Keys Between the Two Parties in a Communication
|5
|1820
|81

CSI2102 - Information Security Technologies | Case Study
|14
|3537
|42

Symmetric Key Encryption | Assignment
|6
|2152
|151

Cryptography Algorithm
|11
|2443
|35

Topics in Encryption of Data
|13
|3659
|429

Encryption Symmetric Key Encryption
|9
|2853
|351