Hashing vs Encryption Differences
Vložit
- čas přidán 13. 06. 2024
- Go to StudyCoding.org to subscribe to the full list of courses and get source code for projects.
How is hashing used in computer security? Hashing can be used to verify a document or file download. Hashing can also be used to store passwords in an application without using clear text.
Information Security playlist • Information Security 1...
Web Development Security playlist • 00 Web and Database Se...
Eloquent but simple. All the hashing vids that I watched before this were so confusing. You did a wonderful job, thank you so much!
You're very welcome!
Saya manma aa dheytherey and then read this is
Mi Mi haaru haaru haaru kihineh adhives I have never ate thag saan i hope so too so too much yoh can you deliver a big big big big answers are are we gonna do you know know know know how many pounds in a business question and i i saw that you get a chance to make vanilla ice cream is a language and its
I completely agree, I watched so many videos trying to understand why SHA would even be used, and none of them answered it until I watched yours. And you had fantastic content through the whole video as well, so thank you.
You earned a sub. I really love the way you explain what hashing is and even gave an example on how to use it for storing passwords. I didn't even notice that it was almost 20 minutes that I was listening to your lecture. 10/10 would recommend this channel to other people again.
I had the same thing. At first I thought that this video is veeeery long. But the end come much sooner that I had hope for. Very useful information without any stupid nonsense and intros
This in one of the simplest and perfect explainations that i have ever seen in my life
Loved the way you simplified everything! Great work
This is such an amazingly created video. Thanks for covering the multiple related aspects in one crisp video.
This is a great video! Your explanation is very to the point without any fluff and presented in a way that doesn't make me wander to the next video. Thank you for the information in such a presentable way!
The fact that I can listen to a programming professor for free is incredible
Really enjoyed this presentation, very clear and easy to understand. Great Job. I am subscribing!
Well laid out. Easy to understand. Your voice wasn't monotone. Thank you. Good video.
Glad you liked it! What other things are you studying lately?
Great explanation, Professor Sluiter. I am studying for CISSP and this saved me a lot of time and cleared up confusion from the useless study guides. Thank you!
This is my first time watching one of your videos and I loved your teaching style. Subscribed!!
This lecture is golden!!
Helped me clear a lot of basics and really understand the concepts!
Thank you professor Shad! Very thorough and easy to understand.
Very concise and crystal clear. Thank you!
Finally a video that explains it clearly!! Thank you!
My english is not that good but i did understand almost everything. Thank you sir. Greetings from Morocco
1:57 So we are going to ignore the subtle shade Mr Shad Sluiter pulled here against windows and mac?..xD really good video too
still...he is using mac
thank you so much for a simple easy to comprehend answer with no filler. nice
I wish I have found this channel earlier. It's much clear and precise compared to the many hyped 'super programmer' CZcamsrs.
Highly valuable and with great and ilustrative examples.
Clear and well explained video, the work of a professional :-) Thank you
This is so good. Thank you professor Sluiter!
Thanks for the video Professor. Very clear explanation to follow. Hashing technique was particularly useful for us in de-duplicating big data sets. Have shared it in a video.
Thank you, your videos are very enlightening and entertaining as well as practical, I got great help from you
Thank you for this. This is very helpful and easy to understand.
Thank you, the explanation was easy and valuable at the same time.
Thank you for all your work and even more for educating here on youtube your explanation is so good even I could understand it
Thanks for your teaching, wonderful job!
Wow - that was fantastic! Really well presented - thanks!
Thank you very much. I enjoyed your way of explaining. Clear simple and straight to the point. Thanks again
Thank you. What kinds of things are you trying to learn?
I love this thorough explanation of Hashing and Encryption. This is awesome work.
Thank you so much!
This was such a great explanation. Thanks!
I'm so glad I found this video. You did an incredible job explaining this.
Glad you enjoyed it! What are you studying?
Thanks so much Pr. Shad! This is a great presentation. Needless to say that I subscribe to your chanel
I really enjoying learning this, thank you!
Great job, useful video, simple explanation, thank you very much!
Thanks a lot Shad ....was simple and easy to digest.Thanks for your time.Laughed at the last joke
Awesome video. Was totally not expecting to see judaiism/rabiis mentioned. Very cool history insight!
Commendable explanation.
Thanks for sharing.
Fantastic explanation. Thank you!
Amazing video, learned so much!
Great explanation, thanks sir!
Wow! Awesome explanation sir.
Amazingly well explained sir. Very grateful for it. Subscribed.
Finally understood this. Thank you Shad!
Thank you for visiting.
simple, crisp and clear ...
subscribed...
Thanks for the sub!
Great explanation... Thank you very much!!!
Great explanation, Thank you very much
Awesome explanation, was always wonder what is Salting!
Great explanations, thanks a lot!
Even a child can understand this .
Very well explained sir
Thank you so much for this video! Enjoyed it
Thank you so much for your explaination.
That video is gold, thank you!
Thank you professor Sluiter
Quality information ..i must say...subscribed...thanks a lot!
very good and nicely presented content
Thank you Sir for your valuable information.
Hello! Thanks for the great video and explanation!
Excellent material. Thank you!
Glad it was helpful!
Great explanation....very easy language used which helps in understanding quick...thank you professor sir
You are most welcome. Thank you for coming
Thanks , very simple and easy complained 🌹
Awesome Awesome 🤩 . I’ve learned a lot!🤝
Excellent, just excellent.
Amazing lacture. Thanks
This was super informativem thank you!
Superb, thank you for sharing
Nice video, helped me understand a lot
Awesome explanation ++++++++++++ Thank you
Excellent content and examples, definitely going to continue checking your videos professor ^^
Thank you. What kind of things are you studying?
@@shadsluiter Well, I am a Network Engineer and Linux Engineer, I am currently exploring blockchain infrastructures, cryptocurrencies and IPv6, all of them require security. Do you broadcast live via CZcams from time to time?
thank you very much for this! very helpful!
Love this channel
Excellent. Thanks.
Awesome info dude.
well explained video, learnt a lot ..
Thanks lots Pro you make it clear even though im not computer background
Aaaaand, now I get it. THANK YOU!
Looking forward to an easy explanation on SHA algorithm!!
Great video. A pleasure to watch.
Glad you enjoyed it! What kind of things are you currently studying?
@@shadsluiter Nothing in particular. I know about using check sums to verify a file's integrity, and I was curious how it works. You also give a lot of contextual additional information, such as what rainbow tables are and why md5 is to be avoided, which was really helpful.
Thank you so much, sir, it was a great speech and very helpful
Thanks and welcome
great explain thank you sir
brilliantly explained.. thanks a lot
Thank you. Any topics you are wanting to study?
Great video.
Thank you so much this is super informative and clear
Glad it was helpful! Are you learning about cyber security, bitcoin or something similar?
Excelente vídeo!
Thank you for making this video. good presentation
My pleasure! Are you studying computer science or something similar?
wow, thank you so much. "... never see a windows or Mac ..." joke cracked me up 🤣
So in other words, whenever a service tells me that my new password is “too similar” to my old password, they aren’t hashing my passwords and basically fucking me over?
They might be encrypting your password
They're mostly trying to deffend your account from successful brute-force attack
@@weltrepublik But if a password is changed by even a single letter and the hashes come out completely different, then they should have no way of knowing that's it is similar. Thus they must be saving my plain text password in order to compare. Doesn't sound like they are defending me at all.
@@Applest2oApples it's not that they're neccessarily saving it as plain text, but to make it harder to brute for hackers.
fx. most people use the same password on every site, so say a hacker gets your password from another not so secure site, but doesn't exploit it in a way you notice, he now has access to everything you have.
now X time later, your pasword gets "expired" on a site, and you change it to something similar, then the next time the hacker tries to login to that site, he will be denied.
Now instead of starting to brute force your new password from scratch (A-Z), almost all hackers will start brute forcing through variations of the old password instead, because most people are lazy, so there's a high propability, that only 1 or 2 letters have been capitalised, or changed and etc....
so just changing a few letters will make the hackers use relative short time to brute your "new" password" (from minutes to a few days), where a totally new password will force them to start from scratch, which means the hacker basically have to be incredibly lucky to crack you new password, as long as you use somewhat secure passwords (upper and lower case, numbers and special chars, and a good lenght)
the above example is also why it's important to use different passwords for each "important" site you use, and not just variations...
hope it made it somewhat clearer :)
@@jankastbjerg4017 the fact that a password is similar to a previous one is besides the point, the point is the website knows what your password is, and doesn’t only have it’s hash saved
Thank you sir!
Masterful!!
Thank you Sir
Thank you
Main difference is that encryption is 2 way(Can be reverted to original string),
and Hashing is 1 way(Cannot be reverted to original string)
Why can’t it be recessed
@@5gun1 here is the process of SHA256 (hashing technique used for mining bitcoins and ethereum) czcams.com/video/f9EbD6iY9zI/video.html
The complexity of it makes it nearly impossible to reverse.
Thanks so much
Thank you for the great video! I found it really helpful! I have one question regarding the fraud using hash function collisions. How can an attacker "take" the signature of the original document and transfer it to the document prepared for fraud if we talk about a digital signature using private/public keys?
great video, but I am also wondering the same thing.
very informative
Amazing!
thank you, very good explanation 🙏
You are welcome!
BEST! 🧨🔥🔥
Thanks