DEV Community

Cover image for π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒
Shahzaib Haider
Shahzaib Haider

Posted on β€’ Originally published at dev.to

π–€π—‡π–Όπ—‹π—’π—‰π—π—‚π—ˆπ—‡ 𝖺𝗇𝖽 π–§π–Ίπ—Œπ—π—‚π—‡π—€: π–§π—ˆπ— 𝖳𝗁𝖾𝗒 π–―π—‹π—ˆπ—π–Ύπ–Όπ— π–Έπ—ˆπ—Žπ—‹ 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Data security is a top priority for businesses and individuals alike. With cyber threats evolving, keeping sensitive information secure has never been more critical. But when it comes to securing data, terms like "Encryption" and "Hashing" often come up. Although these techniques are both essential for data protection, they work in very different ways.

What is Encryption?

Encryption is a process that transforms readable data, known as plaintext, into an unreadable format called ciphertext. This transformation makes data indecipherable to unauthorized users. Only those with the correct "key" can convert ciphertext back into plaintext, restoring the data to its original, readable form.
Symmetric Encryption: a single key used to both encrypt and decrypt data.
Asymmetric Encryption: a pair of keys: one for encryption and another for decryption.

What is Hashing?

Unlike encryption, hashing is a one-way process. Hashing transforms data into a fixed-length string of characters, commonly called a hash or hash value. Once data is hashed, it cannot be reverted to its original form, making hashing ideal for verifying data integrity rather than data confidentiality.

How Hashing Works

Hashing uses mathematical functions to produce a unique hash value based on the input data. Even a small change in the input creates a drastically different hash, which is essential for detecting alterations in the data. Popular hashing algorithms include MD5, SHA-1, and SHA-256.

Common Misconceptions about Encryption and Hashing

To clear up any confusion, let’s address some common myths around encryption and hashing:

  1. Myth: Hashing is a form of encryption.
    Truth: Hashing does not conceal data like encryption. It simply generates a fixed representation (hash) of the original data.

  2. Myth: Encryption is always better than hashing.
    Truth: Encryption and hashing serve different purposes. Each is valuable depending on the context and security needs.

  3. Myth: A hash can be "decrypted."

Truth: Hashes are irreversible, meaning you cannot recover the original data from the hash. This is why hashing is often used for password storage.

That’s it for now, Stay tuned.

Image of Timescale

πŸš€ pgai Vectorizer: SQLAlchemy and LiteLLM Make Vector Search Simple

We built pgai Vectorizer to simplify embedding management for AI applicationsβ€”without needing a separate database or complex infrastructure. Since launch, developers have created over 3,000 vectorizers on Timescale Cloud, with many more self-hosted.

Read more β†’

Top comments (0)

Billboard image

The Next Generation Developer Platform

Coherence is the first Platform-as-a-Service you can control. Unlike "black-box" platforms that are opinionated about the infra you can deploy, Coherence is powered by CNC, the open-source IaC framework, which offers limitless customization.

Learn more

πŸ‘‹ Kindness is contagious

Please leave a ❀️ or a friendly comment on this post if you found it helpful!

Okay