LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-19-2011, 03:28 AM   #1
thunyiwe
LQ Newbie
 
Registered: Nov 2006
Distribution: RHEL4,5,6&7,Debian sarge,etch & Fedora 18,19,20
Posts: 28

Rep: Reputation: 15
Hashing vs Encryption


Hi

Could someone explain to me in their unnderstading of encryption and hashing?
 
Old 08-19-2011, 09:01 AM   #2
anomie
Senior Member
 
Registered: Nov 2004
Location: Texas
Distribution: RHEL, Scientific Linux, Debian, Fedora
Posts: 3,935
Blog Entries: 5

Rep: Reputation: Disabled
Both are broad topics. I recommend reading the Wikipedia entries on them. If you're so inclined, I also recommend Bruce Schneier's book Applied Cryptography.

If you have specific questions, ask 'em here.
 
1 members found this post helpful.
Old 08-21-2011, 03:48 PM   #3
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,649
Blog Entries: 4

Rep: Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934Reputation: 3934
Briefly...

"Hashing" (in the cryptographic sense) is the process of creating a digital signature value. The purpose of the hash is to detect any change, even a change of a single bit within a multi-megabyte document. Furthermore, these algorithms are designed so that the resulting change in the hash-value will be completely unpredictable, and so that it is not possible to calculate what the "correct" hash-value would be for any document without actually hashing its entire content.

"Encryption" is designed to prevent recovery of document contents, unless you possess the exact key (or keys) that was used to encrypt it. These algorithms are designed so that, even if the key is incorrect by one single bit, the decryption will fail, and it will do so in a way that reveals nothing about the actual correct value of the key.

Both types of algorithms are designed to be public knowledge. There is no secret as to precisely how the Blowfish cipher works, or how the SHA1 hash algorithm works. Detailed analyses of the algorithms are also public, and there are constant "peer reviews." So... you can have a Blowfish-enciphered document, and therefore know exactly how it was prepared, and have a copy of the exact code that was used to do it... and if you do not have the key...
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Help hashing ip sockets yaplej Programming 2 11-11-2010 08:19 PM
Address hashing techniques Sunilsbjoshi Programming 2 12-02-2007 01:55 PM
Help with cpp + tokenize + hashing kshkid Programming 2 12-29-2006 08:06 AM
/etc/shadow - passwords not hashing erics_acvw Linux - Security 1 10-31-2006 03:08 AM
Linux and MD5 hashing GAVollink Programming 0 06-04-2003 01:12 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:36 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration