16. Understanding Hashing in Encryption: How It Converts Data Securely ๐
Learn how hashing transforms data into fixed-length strings using mathematical functions, ensuring security and integrity in encryption processes.

Crypto4everyone
93 views โข Feb 15, 2022

About this video
Hashing is a method used within encryption that uses mathematical functions to convert data, regardless of its length, into a fixed-length string.
This fixed-length output string is known as a hash or hash value, hence the term hashing.
Hashing is also commonly referred to as โone-way encryptionโ, as it is impossible to convert a cryptographic hash back into the data it originally represented.
Although hashes are used in a number of different ways, two common use-cases include password verification and information storage.
The length of hash is determined by the hashing algorithm used e.g. SHA256, the hashing algorithm used in Bitcoin mining, always produces a hash of 64 characters.
Common Hashing Algorithms
And although there are hundreds of hashing algorithms some of the most common include:
1) SHA1, which produces a hash length of 40 characters
2) SHA-256, which produces a hash length of 64 characters
3) MD5, which produces a hash length of 32 characters
4) Keccak-512, which produces a hash length of 128 characters
5) And, Keccak-256, which produces a hash length of 64 characters
Subscribe the channel for more and better videos
This fixed-length output string is known as a hash or hash value, hence the term hashing.
Hashing is also commonly referred to as โone-way encryptionโ, as it is impossible to convert a cryptographic hash back into the data it originally represented.
Although hashes are used in a number of different ways, two common use-cases include password verification and information storage.
The length of hash is determined by the hashing algorithm used e.g. SHA256, the hashing algorithm used in Bitcoin mining, always produces a hash of 64 characters.
Common Hashing Algorithms
And although there are hundreds of hashing algorithms some of the most common include:
1) SHA1, which produces a hash length of 40 characters
2) SHA-256, which produces a hash length of 64 characters
3) MD5, which produces a hash length of 32 characters
4) Keccak-512, which produces a hash length of 128 characters
5) And, Keccak-256, which produces a hash length of 64 characters
Subscribe the channel for more and better videos
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
93
Likes
3
Duration
1:44
Published
Feb 15, 2022
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now