From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Hashing

Hashing

- [Instructor] Welcome back. While we cover the two main types of cryptography, specifically symmetric and asymmetric to be exact, there is a surprising third option called hashing. Many may argue that hashing belongs to its own category because it's not an encryption method at all. Encryption methods are two-way functions. For example, we learned that symmetric cryptography is all about leveraging a share key to encrypt a message or scramble it up, and then using the same share key to decrypt that message or unscramble it. In a similar way, asymmetric cryptography is just about the opposite as it uses two separate keys called a key pair. The public key is used to encrypt a message and the private key is used to decrypt that message. Hence, they're both considered two-way functions. Hashing is a one-way function, meaning you scramble the data up, but you never actually recover it back to its original form. Hashing and encryption are different, but also have some similarities. They are…

Contents