Encryption vs. Hashing: The One Key Difference You Need to Know 🔒
Discover the crucial distinction between encryption and hashing in cybersecurity. This quick overview highlights the one key difference that sets these two vital security methods apart.

G MAN : Security
11.2K views • Mar 8, 2024

About this video
In computer security, both Hashing and Encryption are vitally important.
This video is just a very quick drive by of one of the concepts, which is that HASHING is one way and ENCRYPTION is a 2 way function.
HASHING is a one-way function, meaning the plaintext is scrambled into a unique digest, through the use of a salt, that cannot be decrypted.
Examples are MD5, SHA-1, SHA-256, NTLM.
ENCRYPTION on the other hand, is a two-way function where data is passed in as plaintext and comes out as ciphertext, which is unreadable. Since encryption is two-way, the data can be decrypted so it is readable again.
Examples are RSA, AES, Blowfish.
RESOURCES
----------
https://www.tools4noobs.com/online_tools/hash/
https://ghostvolt.com/text-encryption-decryption.html
#hashing #encryption #cybersecurity
OTHER VIDEO FROM G-MAN THE CHANNEL:
-----------------------------------------------------------------
MUSIC TO HELP YOU STUDY - RELAXING SYNTHWAVE
https://www.youtube.com/watch?v=2TWh-7pFtxs&t=0s
ETTERCAP
https://youtu.be/reWnRG-ZOfw?si=c4kPuZWGt3SXdaz4
NMAP - SCAN AND ENUMERATION
https://youtu.be/OVgS26JOK18?si=3LI-wAnTvSn-YmYS
15 ESSENTIAL LINUX COMMANDS
https://youtu.be/3ol3v7WRfUU?si=Iqin_3eNMuL-NSOA
This video is just a very quick drive by of one of the concepts, which is that HASHING is one way and ENCRYPTION is a 2 way function.
HASHING is a one-way function, meaning the plaintext is scrambled into a unique digest, through the use of a salt, that cannot be decrypted.
Examples are MD5, SHA-1, SHA-256, NTLM.
ENCRYPTION on the other hand, is a two-way function where data is passed in as plaintext and comes out as ciphertext, which is unreadable. Since encryption is two-way, the data can be decrypted so it is readable again.
Examples are RSA, AES, Blowfish.
RESOURCES
----------
https://www.tools4noobs.com/online_tools/hash/
https://ghostvolt.com/text-encryption-decryption.html
#hashing #encryption #cybersecurity
OTHER VIDEO FROM G-MAN THE CHANNEL:
-----------------------------------------------------------------
MUSIC TO HELP YOU STUDY - RELAXING SYNTHWAVE
https://www.youtube.com/watch?v=2TWh-7pFtxs&t=0s
ETTERCAP
https://youtu.be/reWnRG-ZOfw?si=c4kPuZWGt3SXdaz4
NMAP - SCAN AND ENUMERATION
https://youtu.be/OVgS26JOK18?si=3LI-wAnTvSn-YmYS
15 ESSENTIAL LINUX COMMANDS
https://youtu.be/3ol3v7WRfUU?si=Iqin_3eNMuL-NSOA
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
11.2K
Likes
27
Duration
1:42
Published
Mar 8, 2024
User Reviews
3.9
(2) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.