Rythorian
New member
- Local time
- Today, 09:50
- Joined
- Feb 1, 2025
- Messages
- 1
I've been an IT for roughly 10 years doing (advanced security development). I'm not a rocket scientist but if any of you get stumped, I'll do my best to help you. I basically reverse engineer malicious applications to combat Malware/Ransomware. I specialize in Encryption and Hashing using native methods (Shell). A lot of people get confused between the process of encryption and hashing.
Encryption is a reversible process that scrambles data using a key, allowing only authorized parties to decrypt it and access the original information, while hashing is a one-way process that transforms data into a fixed-length string, primarily used to verify data integrity and cannot be reversed to retrieve the original data; essentially, encryption protects data confidentiality, while hashing ensures data authenticity.
Key points to remember:
Encryption is a reversible process that scrambles data using a key, allowing only authorized parties to decrypt it and access the original information, while hashing is a one-way process that transforms data into a fixed-length string, primarily used to verify data integrity and cannot be reversed to retrieve the original data; essentially, encryption protects data confidentiality, while hashing ensures data authenticity.
Key points to remember:
- Reversible vs. Irreversible:
Encryption is reversible (you can decrypt data to get the original), while hashing is irreversible (you cannot recover the original data from the hashed value).
- Purpose:
Encryption is used to protect sensitive data from unauthorized access, while hashing is used to verify if data has been tampered with.
- Key usage:
Encryption requires a key to decrypt data, whereas hashing does not use a key.
- Encryption:
Protecting sensitive information like passwords, financial data, and medical records when transmitted over a network.
- Hashing:
Verifying file integrity during downloads, storing passwords securely by hashing them before storing them in a database.