Exploring Hashing and Encryption: Security Mechanisms Analysis

Verified

Added on  2023/03/31

|4
|675
|399
Essay
AI Summary
This essay provides a detailed analysis of hashing and encryption security mechanisms and their relationship in ensuring data security. It defines hashing as a method of generating fixed-size numerical representations of text strings using mathematical functions, emphasizing its role in securing password storage and digital signatures. The essay contrasts hashing with encryption, which transforms data into incomprehensible characters of variable length, and highlights the reversibility of encryption through decryption with the correct key. It distinguishes between symmetric and public key encryption, noting that encryption is essential when messages need to be decrypted by the recipient, whereas hashing is a one-way function. The combination of both mechanisms, exemplified by HTTPS, enhances overall security by encrypting data in transit and securely storing passwords. The essay concludes that while encryption is a two-way process, hashing is a one-way function used to scramble plain text, thereby enhancing data security. Desklib offers more resources for students.
Document Page
Running head: HASHING AND ENCRYPTION SECURITY MECHANISM
Hashing and Encryption Security Mechanism
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1HASHING AND ENCRYPTION SECURITY MECHANISM
Describe the hashing security mechanism and its relationship to the
encryption mechanism
In terms of security mechanism, hashing is generated standards from string of text by
means of numerical functions. Lennox and Holmberg (2017) discussed that hashing is a method
to facilitate the safety throughout development of messages communication at the time the
messages are to be intended for recipient only. Zhang et al., (2017) stated that hashing is used to
an index as well as retrieve the items into the database as it is a faster way to find the items by
means of shorter hashed key as compared to uncover it by means of creative values. Hashing is a
method to accumulate passwords as hashes are to be in one direction of environment. By storage
of passwords into the hash format, then it is critical for somebody with access to unprocessed
data to overturn it. In other word, hashing is foundation of secured storage of passwords. The
hash algorithm is used for mapping out data of the unsystematic dimension to data of the fixed
size. Hash values, codes as well as hash sums are to be coming back by the functions throughout
hashing. Mainly, hashing is utilized as cryptographic applications such as digital signature.
Encryption mechanism is used to turn data in series of incomprehensible characters
which are not of fixed length. There is a key differentiation between encryption as well as
hashing is that encryption mechanism strings are reversed back in innovative decrypted form if it
has right key. There are two types of encryption mechanism such as public in addition to
symmetric key encryption (Boubiche et al., 2016). Into the symmetric key encryption, key is
utilized to encrypt as well as decrypt. On the other hand, public key encryption is utilized where
one key is used to encrypt string (public key) as well as one to decrypt private key. Encryption is
used over hashing security mechanism when it is required for decrypting resulted messages. At
Document Page
2HASHING AND ENCRYPTION SECURITY MECHANISM
the time when it tries to send secured messages to someone, then it is required to use encryption
in place of hashing as the messages are no utilize to receiver if it is not decrypt it. Veerendra and
Prasad (2017) pointed that process to convert information and data in code for preventing
unauthorized access. In case of encryption, encrypted data is made readable whereas hashed data
is not.
By combination of encryption as well as hashing security mechanism, the security of site
is being increased. As taken an example, HTTPS is being encrypted as it ensures that the
password is sent over internet is not reading by others watching connections and by means of
hash function storage of password in database. It will make sure about any break-ins which are
not presenting compromises such as reuse of password and others (Lennox & Holmberg, 2017).
There are some ways to enhance security by means of hashing as well as encryption mechanism.
Therefore, it is concluded that encryption is a two way function which is being encrypted and
decrypted while hashing has on function which can scramble plain text for producing an
innovative messages.
Document Page
3HASHING AND ENCRYPTION SECURITY MECHANISM
References
Boubiche, S., Boubiche, D., Bilami, A., & Toral-Cruz, H. (2016). An outline of data aggregation
security in heterogeneous wireless sensor networks. Sensors, 16(4), 525.
Lennox, J., & Holmberg, C. (2017). Connection-oriented media transport over the transport
layer security (TLS) protocol in the session description protocol (SDP) (No. RFC 8122).
Veerendra, B., & Prasad, Y. D. (2017). A Trusted Framework for Authentication and Security
for Business Applications in Cloud. International Journal of Modern Trends in Science
and Technology, 3, 32-35.
Zhang, L. Y., Liu, Y., Pareschi, F., Zhang, Y., Wong, K. W., Rovatti, R., & Setti, G. (2017). On
the security of a class of diffusion mechanisms for image encryption. IEEE transactions
on cybernetics, 48(4), 1163-1175.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]