Encryption, Encoding and Hashing: Explained (2024)

When it comes to keeping your data safe, there are three main ways to go about it: encryption, encoding and hashing. These terms are often used interchangeably but it is important to understand the difference. In this article, we'll take a look at each of these methods and explain how they work.

Organizations have had breaches that sourced back to using the wrong data transforming method, and have gotten flack when using the terms incorrectly in their press releases as it indicates they are not knowledgeable and potentially careless with user data.

A prime example was a breach Adobe suffered. They used the term “encryption” in their press release when they meant to say they had hashed and salted passwords. This mix-up caused a lot of uproar as encryption is a much stronger method than hashing and salting (which we will get into later).

What is Encoding?

Encoding data is a process involving changing data into a new format using a scheme. Encoding is a reversible process and data can be encoded to a new format and decoded to its original format. Encoding typically involves a publicly available scheme that is easily reversed. Encoding data is typically used to ensure the integrity and usability of data and is commonly used when data cannot be transferred in its current format between systems or applications. Encoding is not used to protect or secure data because it is easy to reverse.

An example of encoding is: Base64

Take a scenario where a user wants to upload a resume to a job application website and the web server stores the file as a .docx file. The user's resume may contain confidential information such as their home address, date of birth or social security number. To protect this data, the user could encode their resume to Base64 prior to uploading it to the website. Once the resume has been uploaded, the web server would then decode it back to its .docx format for storage.

What is Hashing?

Hashing is a one-way process where data is transformed into a fixed length alphanumeric string. This string is known as a hash or message digest. A hash cannot be reversed back to the original data because it is a one-way operation. Hashing is commonly used to verify the integrity of data, commonly referred to as a checksum. If two pieces of identical data are hashed using the same hash function, the resulting hash will be identical. If the two pieces of data are different, the resulting hashes will be different and unique.

In addition to verifying the integrity of data, hashing is the recommended data transformation technique in authentication processes for computer systems and applications. It is recommended to never store passwords and instead store only the hash of the “salted password”. A salt is a random string appended to a password that only the authentication process system knows; this guarantees that if two users have the same password the stored hashes are different.

When a user inputs a password to a web application, the password is sent to the web server. The web server then appends the salt to the password and performs a hash function on the password and a salt and compares this output hash with the hash stored in the database for the user. If the hashes match for that user, the user is granted access. Hashing ensures in the event of a breach, or malicious insider the original passwords can never be retrieved. Salting ensures that, if a breach does occur, an attacker cannot determine which users have the same passwords.

An example of a hash function is: SHA512

As an example, say Alice wants to send Bob a file and verify that Bob has the exact same file and that no changes occurred in the transferring process. Alice will email Bob the file along with a hash of the file. After Bob downloads the file, he can verify the file is identical by performing a hash function on the file and verify the resulting hash is the same as Alice provided.

What is Encryption?

Encryption is the process of securely encoding data in such a way that only authorized users with a key or password can decrypt the data to reveal the original. Encryption is used when data needs to be protected so those without the decryption keys cannot access the original data. When data is sent to a website over HTTPS it is encrypted using the public key type. While encryption does involve encoding data, the two are not interchangeable terms, encryption is always used when referring to data that has been securely encoded. Encoding data is used only when talking about data that is not securely encoded.

There are two basic types of encryption: symmetric key and public key.

In a symmetric key, the same key is used to encrypt and decrypt data, like a password. In public key encryption, one key is used to encrypt data and a different key is used to decrypt the data.

An example of encryption is: AES 256

AES is the Advanced Encryption Standard and is a symmetric key encryption. AES uses a 256-bit key which means there are 2^256, or 1.158x10^77, possible keys that can be used.

Summary

  • Encoding: Reversible transformation of data format, used to preserve the usability of data.

  • Hashing: A one-way summary of data that cannot be reversed and is used to validate the integrity of data.

  • Encryption: Secure encoding of data used to protect the confidentiality of data.

Encryption, Encoding and Hashing: Explained (2024)
Top Articles
10 Safest Cities in the US to Live in (2024 Rankings)
Association of 12 h shifts and nurses’ job satisfaction, burnout and intention to leave: findings from a cross-sectional study of 12 European countries
The Potter Enterprise from Coudersport, Pennsylvania
Www Craigslist Louisville
Atrium Shift Select
270 West Michigan residents receive expert driver’s license restoration advice at last major Road to Restoration Clinic of the year
Danielle Longet
4Chan Louisville
Socket Exception Dunkin
Help with Choosing Parts
Gwdonate Org
Craigslist Apartments In Philly
Curtains - Cheap Ready Made Curtains - Deconovo UK
Jackson Stevens Global
Arboristsite Forum Chainsaw
fort smith farm & garden - craigslist
Wilmot Science Training Program for Deaf High School Students Expands Across the U.S.
Wisconsin Women's Volleyball Team Leaked Pictures
Paradise leaked: An analysis of offshore data leaks
Arre St Wv Srj
Diamond Piers Menards
Equibase | International Results
Aps Day Spa Evesham
Scout Shop Massapequa
eHerkenning (eID) | KPN Zakelijk
Lakers Game Summary
Reptile Expo Fayetteville Nc
Jenna Ortega’s Height, Age, Net Worth & Biography
Magic Seaweed Daytona
Dark Entreaty Ffxiv
Bellin Patient Portal
Bocca Richboro
Bolsa Feels Bad For Sancho's Loss.
HP PARTSURFER - spare part search portal
101 Lewman Way Jeffersonville In
Opsahl Kostel Funeral Home & Crematory Yankton
Wcostream Attack On Titan
Fandango Pocatello
Rise Meadville Reviews
Austin Automotive Buda
19 Best Seafood Restaurants in San Antonio - The Texas Tasty
Download Diablo 2 From Blizzard
Puretalkusa.com/Amac
Tripadvisor Vancouver Restaurants
Coroner Photos Timothy Treadwell
Brother Bear Tattoo Ideas
Streameast Io Soccer
Bonecrusher Upgrade Rs3
How to Find Mugshots: 11 Steps (with Pictures) - wikiHow
The Latest Books, Reports, Videos, and Audiobooks - O'Reilly Media
Shiftselect Carolinas
Factorio Green Circuit Setup
Latest Posts
Article information

Author: Horacio Brakus JD

Last Updated:

Views: 6726

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Horacio Brakus JD

Birthday: 1999-08-21

Address: Apt. 524 43384 Minnie Prairie, South Edda, MA 62804

Phone: +5931039998219

Job: Sales Strategist

Hobby: Sculling, Kitesurfing, Orienteering, Painting, Computer programming, Creative writing, Scuba diving

Introduction: My name is Horacio Brakus JD, I am a lively, splendid, jolly, vivacious, vast, cheerful, agreeable person who loves writing and wants to share my knowledge and understanding with you.