Hashing vs Encryption Differences

Hashing vs Encryption Differences

Programming w/ Professor Sluiter

4 года назад

165,478 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Thayna Emilly Cavalcante Santos
Thayna Emilly Cavalcante Santos - 08.08.2023 17:13

Excellent material. Thank you!

Ответить
محمد الثاني
محمد الثاني - 30.07.2023 19:30

That Was Great !

Ответить
RF 987
RF 987 - 25.07.2023 08:21

how is classical symmetric cipher different compared to modern cipher ?

Ответить
Anonymous
Anonymous - 09.06.2023 19:48

Thanks

Ответить
Ric P
Ric P - 08.05.2023 07:39

Great explanations, thanks a lot!

Ответить
ramiro garza
ramiro garza - 18.03.2023 05:00

This is my first time watching one of your videos and I loved your teaching style. Subscribed!!

Ответить
Keith Rogers
Keith Rogers - 13.03.2023 02:26

Hello - World.... I like what you did there, lol!

Ответить
Parth Mangalkar
Parth Mangalkar - 08.03.2023 09:27

This lecture is golden!!
Helped me clear a lot of basics and really understand the concepts!

Ответить
Greg Does Stuff
Greg Does Stuff - 21.02.2023 20:50

Fantastic explanation. Thank you!

Ответить
Paulo Costa
Paulo Costa - 08.02.2023 04:58

One argument I heard from cryptographers pondering about the futility using 'salt' is that if someone has access to the database where you store the hashed passwords, the attackers already had access to your critical data anyway.

Ответить
Paul Keith
Paul Keith - 29.01.2023 00:53

Mallory 's hairdo alone is criminal!

Ответить
Sebastjans Slavitis
Sebastjans Slavitis - 08.01.2023 20:32

your example why MD5 isn't secure doesn't really show anything. Its equally easy to generate table would it be 128 bit or 512 bit hash. Otherwise awesome video.

Ответить
Davegbuf
Davegbuf - 15.12.2022 21:39

Excellent video and explaining the technology. However, I have a situation where I don't know how I would adapt the concepts you explained because the scenario is slightly different. Your example works interactively by comparing user passwords with stored hash values. My scenario is for an automated process (no user interaction at all) and the credentials are self-contained in the program package. These must not be known to the user or anyone who can get a hold of the file(s) containing them.

Here is a live example … We have a company application that requires administrative rights to execute but our users only have standard Windows user permissions. I repackaged the application into a single EXE executable script to conceal the admin credentials that are included in the script code. However, I discovered that compiling the script is not enough because the EXE file can be decompiled or someone can use other programs to see the contents.

How can I adapt the concepts you explained in your video this my scenario? I need to be able to execute a self-contained application package locally (no network or internet resources) and with specific credentials while protecting said credentials from the local user or anyone who might get a hold of the EXE file containing the credentials. The application needs to use these credentials at run time to perform its tasks.

Your insight is most appreciated.

Ответить
snippletrap
snippletrap - 26.11.2022 00:48

"never see Windows or Mac again in your life"
deal!

Ответить
Android pc
Android pc - 23.11.2022 12:41

💙💙

Ответить
Vesna
Vesna - 09.11.2022 11:04

these 'keys'.... would you encrypt your 'private key' in case someone tries to steal it?

Ответить
Gamini Ranawaka
Gamini Ranawaka - 27.10.2022 15:54

Great explanation, Thank you very much

Ответить
Gideon Mega
Gideon Mega - 29.09.2022 19:15

Awesome Awesome 🤩 . I’ve learned a lot!🤝

Ответить
Savagely Karmatic
Savagely Karmatic - 19.09.2022 22:21

The joke at the end..🤦🏿‍♂️

Ответить
Sandeep Hari
Sandeep Hari - 12.09.2022 01:09

Amazing!

Ответить
Gustavo Luque
Gustavo Luque - 21.07.2022 19:42

Excellent, just excellent.

Ответить
Peter Dimeji
Peter Dimeji - 09.06.2022 17:57

Wow! Awesome explanation sir.

Ответить
Julio Javier A
Julio Javier A - 09.06.2022 05:05

Great explanation... Thank you very much!!!

Ответить
Skjaldr
Skjaldr - 23.05.2022 01:04

This is a great video! Your explanation is very to the point without any fluff and presented in a way that doesn't make me wander to the next video. Thank you for the information in such a presentable way!

Ответить
David Hadden
David Hadden - 28.04.2022 11:13

Aaaaand, now I get it. THANK YOU!

Ответить
Sooraj Kumar R
Sooraj Kumar R - 19.04.2022 21:21

This is such an amazingly created video. Thanks for covering the multiple related aspects in one crisp video.

Ответить
Sebastiaan
Sebastiaan - 17.04.2022 15:44

This was super informativem thank you!

Ответить
XYZ
XYZ - 15.04.2022 22:32

I wish you were in my country to solve all my hashes and keys - Purchase from 2010 N 2011 N 2013 😥

Ответить
Mayur Panchal
Mayur Panchal - 09.04.2022 21:13

Amazing

Ответить
Farooq Khan
Farooq Khan - 08.04.2022 07:39

Commendable explanation.
Thanks for sharing.

Ответить
Two O Two
Two O Two - 07.04.2022 21:49

wow, thank you so much. "... never see a windows or Mac ..." joke cracked me up 🤣

Ответить
only for sale
only for sale - 29.03.2022 06:32

But if the hasing value also changed according to changed document by attacker and give to receiver

Ответить
Python24
Python24 - 25.03.2022 22:41

Thanks for the video Professor. Very clear explanation to follow. Hashing technique was particularly useful for us in de-duplicating big data sets. Have shared it in a video.

Ответить
Playonce
Playonce - 24.03.2022 22:36

Main difference is that encryption is 2 way(Can be reverted to original string),
and Hashing is 1 way(Cannot be reverted to original string)

Ответить
kuhak
kuhak - 13.03.2022 14:27

the common practical way:
1) encrypt+hash+salter
2) Data send through encrypted package
3) Unencrypt the received data
4) Check on the hash and token should return valid/true.
5) do the things...

Regarding MD5, shouldn't really use it, if still insisted, must merge with add-on unique hashing algorithm to generate the only unique result.
In reality, there are still tons of systems still using the MD5 hashing basis but they modified with other unique hashing algorithm.

Ответить
Neel Rove
Neel Rove - 10.03.2022 05:32

top video

Ответить
Helge Schneider
Helge Schneider - 03.03.2022 14:00

That video is gold, thank you!

Ответить
ArduinoBen
ArduinoBen - 01.03.2022 06:39

goat

Ответить
Jawad Haider
Jawad Haider - 27.02.2022 09:37

Love this channel

Ответить
Raul Birta
Raul Birta - 02.02.2022 18:10

Amazingly well explained sir. Very grateful for it. Subscribed.

Ответить
Yassine Ze
Yassine Ze - 01.02.2022 11:42

Thanks lots Pro you make it clear even though im not computer background

Ответить
Aakash Raymond
Aakash Raymond - 30.01.2022 23:07

Damn this is good , not good amazing !

Ответить
MrSaud
MrSaud - 26.01.2022 18:20

Thank you sir!

Ответить
Dino Sharabany
Dino Sharabany - 29.12.2021 11:47

Hi, how can 64 units represent all the combination of all the files and or passwords in the world? thank you

Ответить
George Benjamin
George Benjamin - 25.12.2021 21:55

Thank you so much for this video! Enjoyed it

Ответить
galasevgisi
galasevgisi - 14.12.2021 14:25

Thank you professor Sluiter

Ответить
Moon Cake🥮
Moon Cake🥮 - 14.12.2021 09:45

BEST! 🧨🔥🔥

Ответить