A-Z Popular New Study Guide Search »
Information Security
 
Related Guides
Encryption

Encryption vs Hashing

 , updated on
Encryption is the conversion of data into a format known as ciphertext that can't be understood without a key.
Hashing is the conversion of data into a fixed length code using techniques that are difficult to reverse.

Encryption vs Hashing

Encryption provides two-way functionality that allows data to be converted to ciphertext and back to data using a key.
Hashing provides one-way functionality that produces a fixed length hashcode from data that is difficult to reverse back to data.
Encryption is used to secure data and communications from unauthorized access. Hashing is used for a variety of purposes such as generating secure keys for encryption, storing passwords in databases and generating digital signatures. A small change in data input results in a completely different hashcode. This can be useful for verifying that a downloaded file hasn't been tampered with.
Hashcodes can't be considered encrypted data. However, hashcodes are one of the foundational techniques of cryptography that is commonly used to generate keys, store passwords and verify identity.
Encryption vs Hashing
Encryption
Hashing
Definition
Two-way functionality for converting data into ciphertext that relies on secret keys.
One-way functionality for generating unique, fixed length codes from data that are infeasible to reverse back to the data.
Next: Examples of Encryption

Encryption

This is the complete list of articles we have written about encryption.
Cleartext
Cryptography
Hashcode
Key Stretching
Keys
Nonce
Pepper
Private Key
Random Seed
Salt
Plaintext
Pseudorandom
Public Key
Public Key Encryption
Strong Password
Symmetric Encryption
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Encryption Examples

A definition of encryption with examples.

Asymmetric vs Symmetric

The differences between asymmetric and symmetric encryption.

Random Seed

The definition of random seed with examples.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map