Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. C#
  4. What is the difference between hashing or encryption a data

What is the difference between hashing or encryption a data

Scheduled Pinned Locked Moved C#
questionalgorithmssecuritycryptography
32 Posts 10 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Richard DeemingR Richard Deeming

    Gerry Schmitz wrote:

    A "fully optimized" hash is 2-way;

    I'm starting to suspect you're using a different meaning of that word. :doh:

    Hash function - Wikipedia[^]:

    In cryptographic applications, hash functions are typically expected to be practically non-invertible, meaning that it is not realistic to reconstruct the input datum x from its hash value h(x) alone without spending great amounts of computing time (see also One-way function).

    Cryptographic hash function - Wikipedia[^]:

    it is infeasible to generate a message from its hash value except by trying all possible messages

    You want to use anything other than a cryptographic hash function for password storage? Not on my watch. ;P


    "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

    L Offline
    L Offline
    Lost User
    wrote on last edited by
    #21

    You're confirming what I've been saying.

    "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

    Richard DeemingR Z 2 Replies Last reply
    0
    • L Lost User

      I use Windows Authentication. I don't presume to know more. I said there would be colissions; you want to quibble about the number.

      "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

      Richard DeemingR Online
      Richard DeemingR Online
      Richard Deeming
      wrote on last edited by
      #22

      And how do you think Windows stores your password? :rolleyes:

      Passwords Technical Overview[^]:

      For use in Windows networking, including Active Directory domains, the password is stored two different ways by default: as the LAN Manager one-way function (LM OWF) and as the NT OWF. "One-way function" is a term that denotes a one-way mathematical transformation of data. ... The most common type of one-way function in use is a cryptographic hash.

      Although interestingly, Microsoft have added to the confusion by referring to "encryption" in the same sentence.


      "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

      "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

      L 1 Reply Last reply
      0
      • L Lost User

        You're confirming what I've been saying.

        "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

        Richard DeemingR Online
        Richard DeemingR Online
        Richard Deeming
        wrote on last edited by
        #23

        The only thing I'm confirming is that some people don't understand the difference between encrypting and hashing. :laugh: security - Fundamental difference between Hashing and Encryption algorithms - Stack Overflow[^]


        "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

        "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

        L 1 Reply Last reply
        0
        • Richard DeemingR Richard Deeming

          And how do you think Windows stores your password? :rolleyes:

          Passwords Technical Overview[^]:

          For use in Windows networking, including Active Directory domains, the password is stored two different ways by default: as the LAN Manager one-way function (LM OWF) and as the NT OWF. "One-way function" is a term that denotes a one-way mathematical transformation of data. ... The most common type of one-way function in use is a cryptographic hash.

          Although interestingly, Microsoft have added to the confusion by referring to "encryption" in the same sentence.


          "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #24

          In this case, I don't care and don't need to know.

          "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

          1 Reply Last reply
          0
          • Richard DeemingR Richard Deeming

            The only thing I'm confirming is that some people don't understand the difference between encrypting and hashing. :laugh: security - Fundamental difference between Hashing and Encryption algorithms - Stack Overflow[^]


            "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #25

            Quote:

            A hash function is any function that can be used to map data of arbitrary size to data of fixed size

            I also prefer "Coke Classic".

            "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

            1 Reply Last reply
            0
            • P Pete OHanlon

              As usual, you come here having done no research for yourself. Use Google or Bing. This information is all available for you.

              This space for rent

              A Offline
              A Offline
              Afzaal Ahmad Zeeshan
              wrote on last edited by
              #26

              Not his first time. :laugh:

              The shit I complain about It's like there ain't a cloud in the sky and it's raining out - Eminem ~! Firewall !~

              P 1 Reply Last reply
              0
              • L Lost User

                You're confirming what I've been saying.

                "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

                Z Offline
                Z Offline
                ZurdoDev
                wrote on last edited by
                #27

                I'm with Richard. It does not appear that you are using the same understanding that others have.

                There are two kinds of people in the world: those who can extrapolate from incomplete data. There are only 10 types of people in the world, those who understand binary and those who don't.

                L 1 Reply Last reply
                0
                • Z ZurdoDev

                  I'm with Richard. It does not appear that you are using the same understanding that others have.

                  There are two kinds of people in the world: those who can extrapolate from incomplete data. There are only 10 types of people in the world, those who understand binary and those who don't.

                  L Offline
                  L Offline
                  Lost User
                  wrote on last edited by
                  #28

                  You (speaking rhetorically) fixate on one technique / application and categorize a whole branch. Hashing as a technique "in" an "encryption situation"; it is only a footnote in applied cryptology ... usually with a sidebar to the effect of " ... but one only had to alter the last bit to etc. ...". If you really want to educate yourself on hashing, learn about the various ways to defeat hashing. I just thought the original question made about as much sense as asking what is the difference between a BMW and "an automobile" (which is confirmed by the length of the thread).

                  "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

                  Richard DeemingR 1 Reply Last reply
                  0
                  • A Afzaal Ahmad Zeeshan

                    Not his first time. :laugh:

                    The shit I complain about It's like there ain't a cloud in the sky and it's raining out - Eminem ~! Firewall !~

                    P Offline
                    P Offline
                    Pete OHanlon
                    wrote on last edited by
                    #29

                    Indeed. I've lost count of the number of posts like this from him.

                    This space for rent

                    1 Reply Last reply
                    0
                    • L Lost User

                      You (speaking rhetorically) fixate on one technique / application and categorize a whole branch. Hashing as a technique "in" an "encryption situation"; it is only a footnote in applied cryptology ... usually with a sidebar to the effect of " ... but one only had to alter the last bit to etc. ...". If you really want to educate yourself on hashing, learn about the various ways to defeat hashing. I just thought the original question made about as much sense as asking what is the difference between a BMW and "an automobile" (which is confirmed by the length of the thread).

                      "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

                      Richard DeemingR Online
                      Richard DeemingR Online
                      Richard Deeming
                      wrote on last edited by
                      #30

                      In general terms, yes, "hashing" has a wider meaning than "a cryptographic hash function". In the context of the original question, I think it's reasonable to assume that the OP was referring to "a cryptographic hash function", and not any of the other possible meanings. But given the OP's history as a help vampire, and the fact that he could have answered his own question by spending five minutes in Google, I also think it's reasonable to ignore the question, or direct him to Google. :)


                      "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                      "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

                      L 1 Reply Last reply
                      0
                      • Richard DeemingR Richard Deeming

                        In general terms, yes, "hashing" has a wider meaning than "a cryptographic hash function". In the context of the original question, I think it's reasonable to assume that the OP was referring to "a cryptographic hash function", and not any of the other possible meanings. But given the OP's history as a help vampire, and the fact that he could have answered his own question by spending five minutes in Google, I also think it's reasonable to ignore the question, or direct him to Google. :)


                        "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

                        L Offline
                        L Offline
                        Lost User
                        wrote on last edited by
                        #31

                        My point is always to get the "OP" to clarify their OWN question. The fact that everyone needs to jump in an "reinterpret" my intentions is their problem. The fact that I am not always "obvious" about it, is also not my problem.

                        "(I) am amazed to see myself here rather than there ... now rather than then". ― Blaise Pascal

                        1 Reply Last reply
                        0
                        • T Tridip Bhattacharjee
                          1. please some one tell me difference between hashing or encryption a data. 2) i saw hashing also encrypt data which is not human readable and encryption does the same then why people think hashing is different from encryption ? 3) what hashing does ? 4) if we encrypt data then we can decrypt it too but if we hashing the data then can we reverse the process ? 5) if no then what algorithm hashing use that no one can reverse the data ? 6) give me two sample code to has data one will hash data without salt key and another one hash data with salt key. thanks

                          tbhattacharjee

                          P Offline
                          P Offline
                          Patrice T
                          wrote on last edited by
                          #32

                          Never thought about using Google for such basic researches ?

                          Patrice “Everything should be made as simple as possible, but no simpler.” Albert Einstein

                          1 Reply Last reply
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Don't have an account? Register

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups