Monthly Archives: April 2013
Security Interlude: The real-world difference between Hashing and Encryption
Roger Smith Security, Software Encryption, hacking, hashing, password, retrieval, Security 0 Comments
Last week we learned about the other half of the encryption/hashing relationship. Hopefully you remember the cake/safe deposit box analogy that we’ve been exploring from this StackOverflow answer. More →
Security 102: What is Hashing?
Roger Smith Security, Software algorithm, Hash, object storage, password, Security 0 Comments
Welcome to our second blog post on basic security! Last week we were discussing encryption, and it’s ability to convert information between its’ encrypted and unencrypted states, using a ‘key’ to perform the conversion. This week, we’ll take a look at hashing, the one-way bridge of the security world. Remember, most of this analogy comes courtesy of this StackOverflow answer. More →
Security 101: What is Encryption?
Roger Smith Security, Software Encryption, Hash, Password Storage, Security 0 Comments
While doing some security reading for my internship last week, I saw hashing and encryption mentioned quite a bit, and had originally thought the two terms interchangeable, believing that a hash was the result of an encryption. I was wrong though, and needed to find the difference. Luckily, Eric pushed me in the direction of a good analogy, which you can find on the ever-trusty StackOverflow. More →