Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. C#
  4. What is the difference between hashing or encryption a data

What is the difference between hashing or encryption a data

Scheduled Pinned Locked Moved C#
questionalgorithmssecuritycryptography
32 Posts 10 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • OriginalGriffO OriginalGriff

    Gerry Schmitz wrote:

    You want to play with hashing algorithms for "password security"? Not on my watch.

    The hashing algorithms used for passwords are considerably more secure than any encryption: SHA-512 for example generates a 512 bit hash value from the (hopefully salted) user password input. This is compared with the stored hash - so the "clear text" password is never transfered out of the authenticating system - and a match confirms the input. This gives you in theory a 1 : 1.34078079e154 chance of a collision or "false positive" assuming that the hashing algorithm gives no weight to any particular range of output values. You cannot regenerate the original input from the hashed value. Encrypted password on the other hand are seriously insecure: the decryption key has to be available to the "check the password" code and that means that it's effectively stored with the encrypted data. Please, do tell us which security systems you have implemented encryption for, so we can avoid them or ensure that we only ever use a "one-time" password (which I do anyway, no two of my logins have the same password, and I use an encrypted password store to hold them - the password to that is only ever stored in my head...)

    Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

    L Offline
    L Offline
    Lost User
    wrote on last edited by
    #20

    I use Windows Authentication. I don't presume to know more. I said there would be colissions; you want to quibble about the number.

    "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

    Richard DeemingR 1 Reply Last reply
    0
    • Richard DeemingR Richard Deeming

      Gerry Schmitz wrote:

      A "fully optimized" hash is 2-way;

      I'm starting to suspect you're using a different meaning of that word. :doh:

      Hash function - Wikipedia[^]:

      In cryptographic applications, hash functions are typically expected to be practically non-invertible, meaning that it is not realistic to reconstruct the input datum x from its hash value h(x) alone without spending great amounts of computing time (see also One-way function).

      Cryptographic hash function - Wikipedia[^]:

      it is infeasible to generate a message from its hash value except by trying all possible messages

      You want to use anything other than a cryptographic hash function for password storage? Not on my watch. ;P


      "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #21

      You're confirming what I've been saying.

      "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

      Richard DeemingR Z 2 Replies Last reply
      0
      • L Lost User

        I use Windows Authentication. I don't presume to know more. I said there would be colissions; you want to quibble about the number.

        "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

        Richard DeemingR Offline
        Richard DeemingR Offline
        Richard Deeming
        wrote on last edited by
        #22

        And how do you think Windows stores your password? :rolleyes:

        Passwords Technical Overview[^]:

        For use in Windows networking, including Active Directory domains, the password is stored two different ways by default: as the LAN Manager one-way function (LM OWF) and as the NT OWF. "One-way function" is a term that denotes a one-way mathematical transformation of data. ... The most common type of one-way function in use is a cryptographic hash.

        Although interestingly, Microsoft have added to the confusion by referring to "encryption" in the same sentence.


        "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

        "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

        L 1 Reply Last reply
        0
        • L Lost User

          You're confirming what I've been saying.

          "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

          Richard DeemingR Offline
          Richard DeemingR Offline
          Richard Deeming
          wrote on last edited by
          #23

          The only thing I'm confirming is that some people don't understand the difference between encrypting and hashing. :laugh: security - Fundamental difference between Hashing and Encryption algorithms - Stack Overflow[^]


          "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

          "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

          L 1 Reply Last reply
          0
          • Richard DeemingR Richard Deeming

            And how do you think Windows stores your password? :rolleyes:

            Passwords Technical Overview[^]:

            For use in Windows networking, including Active Directory domains, the password is stored two different ways by default: as the LAN Manager one-way function (LM OWF) and as the NT OWF. "One-way function" is a term that denotes a one-way mathematical transformation of data. ... The most common type of one-way function in use is a cryptographic hash.

            Although interestingly, Microsoft have added to the confusion by referring to "encryption" in the same sentence.


            "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #24

            In this case, I don't care and don't need to know.

            "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

            1 Reply Last reply
            0
            • Richard DeemingR Richard Deeming

              The only thing I'm confirming is that some people don't understand the difference between encrypting and hashing. :laugh: security - Fundamental difference between Hashing and Encryption algorithms - Stack Overflow[^]


              "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #25

              Quote:

              A hash function is any function that can be used to map data of arbitrary size to data of fixed size

              I also prefer "Coke Classic".

              "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

              1 Reply Last reply
              0
              • P Pete OHanlon

                As usual, you come here having done no research for yourself. Use Google or Bing. This information is all available for you.

                This space for rent

                A Offline
                A Offline
                Afzaal Ahmad Zeeshan
                wrote on last edited by
                #26

                Not his first time. :laugh:

                The shit I complain about It's like there ain't a cloud in the sky and it's raining out - Eminem ~! Firewall !~

                P 1 Reply Last reply
                0
                • L Lost User

                  You're confirming what I've been saying.

                  "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

                  Z Offline
                  Z Offline
                  ZurdoDev
                  wrote on last edited by
                  #27

                  I'm with Richard. It does not appear that you are using the same understanding that others have.

                  There are two kinds of people in the world: those who can extrapolate from incomplete data. There are only 10 types of people in the world, those who understand binary and those who don't.

                  L 1 Reply Last reply
                  0
                  • Z ZurdoDev

                    I'm with Richard. It does not appear that you are using the same understanding that others have.

                    There are two kinds of people in the world: those who can extrapolate from incomplete data. There are only 10 types of people in the world, those who understand binary and those who don't.

                    L Offline
                    L Offline
                    Lost User
                    wrote on last edited by
                    #28

                    You (speaking rhetorically) fixate on one technique / application and categorize a whole branch. Hashing as a technique "in" an "encryption situation"; it is only a footnote in applied cryptology ... usually with a sidebar to the effect of " ... but one only had to alter the last bit to etc. ...". If you really want to educate yourself on hashing, learn about the various ways to defeat hashing. I just thought the original question made about as much sense as asking what is the difference between a BMW and "an automobile" (which is confirmed by the length of the thread).

                    "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

                    Richard DeemingR 1 Reply Last reply
                    0
                    • A Afzaal Ahmad Zeeshan

                      Not his first time. :laugh:

                      The shit I complain about It's like there ain't a cloud in the sky and it's raining out - Eminem ~! Firewall !~

                      P Offline
                      P Offline
                      Pete OHanlon
                      wrote on last edited by
                      #29

                      Indeed. I've lost count of the number of posts like this from him.

                      This space for rent

                      1 Reply Last reply
                      0
                      • L Lost User

                        You (speaking rhetorically) fixate on one technique / application and categorize a whole branch. Hashing as a technique "in" an "encryption situation"; it is only a footnote in applied cryptology ... usually with a sidebar to the effect of " ... but one only had to alter the last bit to etc. ...". If you really want to educate yourself on hashing, learn about the various ways to defeat hashing. I just thought the original question made about as much sense as asking what is the difference between a BMW and "an automobile" (which is confirmed by the length of the thread).

                        "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

                        Richard DeemingR Offline
                        Richard DeemingR Offline
                        Richard Deeming
                        wrote on last edited by
                        #30

                        In general terms, yes, "hashing" has a wider meaning than "a cryptographic hash function". In the context of the original question, I think it's reasonable to assume that the OP was referring to "a cryptographic hash function", and not any of the other possible meanings. But given the OP's history as a help vampire, and the fact that he could have answered his own question by spending five minutes in Google, I also think it's reasonable to ignore the question, or direct him to Google. :)


                        "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                        "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                        L 1 Reply Last reply
                        0
                        • Richard DeemingR Richard Deeming

                          In general terms, yes, "hashing" has a wider meaning than "a cryptographic hash function". In the context of the original question, I think it's reasonable to assume that the OP was referring to "a cryptographic hash function", and not any of the other possible meanings. But given the OP's history as a help vampire, and the fact that he could have answered his own question by spending five minutes in Google, I also think it's reasonable to ignore the question, or direct him to Google. :)


                          "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                          L Offline
                          L Offline
                          Lost User
                          wrote on last edited by
                          #31

                          My point is always to get the "OP" to clarify their OWN question. The fact that everyone needs to jump in an "reinterpret" my intentions is their problem. The fact that I am not always "obvious" about it, is also not my problem.

                          "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

                          1 Reply Last reply
                          0
                          • T Tridip Bhattacharjee
                            1. please some one tell me difference between hashing or encryption a data. 2) i saw hashing also encrypt data which is not human readable and encryption does the same then why people think hashing is different from encryption ? 3) what hashing does ? 4) if we encrypt data then we can decrypt it too but if we hashing the data then can we reverse the process ? 5) if no then what algorithm hashing use that no one can reverse the data ? 6) give me two sample code to has data one will hash data without salt key and another one hash data with salt key. thanks

                            tbhattacharjee

                            P Offline
                            P Offline
                            Patrice T
                            wrote on last edited by
                            #32

                            Never thought about using Google for such basic researches ?

                            Patrice “Everything should be made as simple as possible, but no simpler.” Albert Einstein

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups