16. Understanding Hashing in Encryption: How It Converts Data Securely ๐Ÿ”

Learn how hashing transforms data into fixed-length strings using mathematical functions, ensuring security and integrity in encryption processes.

16. Understanding Hashing in Encryption: How It Converts Data Securely ๐Ÿ”
Crypto4everyone
93 views โ€ข Feb 15, 2022
16. Understanding Hashing in Encryption: How It Converts Data Securely ๐Ÿ”

About this video

Hashing is a method used within encryption that uses mathematical functions to convert data, regardless of its length, into a fixed-length string.

This fixed-length output string is known as a hash or hash value, hence the term hashing.

Hashing is also commonly referred to as โ€œone-way encryptionโ€, as it is impossible to convert a cryptographic hash back into the data it originally represented.

Although hashes are used in a number of different ways, two common use-cases include password verification and information storage.

The length of hash is determined by the hashing algorithm used e.g. SHA256, the hashing algorithm used in Bitcoin mining, always produces a hash of 64 characters.


Common Hashing Algorithms

And although there are hundreds of hashing algorithms some of the most common include:

1) SHA1, which produces a hash length of 40 characters

2) SHA-256, which produces a hash length of 64 characters

3) MD5, which produces a hash length of 32 characters

4) Keccak-512, which produces a hash length of 128 characters

5) And, Keccak-256, which produces a hash length of 64 characters


Subscribe the channel for more and better videos

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

93

Likes

3

Duration

1:44

Published

Feb 15, 2022

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.