Hashing vs. Encryption: Key Differences You Need to Know πŸ”

Discover the fundamental differences between hashing and encryption algorithms, explained with simple analogies to help you understand their unique roles in data security.

Hashing vs. Encryption: Key Differences You Need to Know πŸ”
The Sharp Turtles
17.9K views β€’ Mar 11, 2015
Hashing vs. Encryption: Key Differences You Need to Know πŸ”

About this video

A hash function could be considered the same as baking a loaf of bread. You start out with inputs (flour, water, yeast, etc...) and after applying the hash function (mixing + baking), you end up with an output: a loaf of bread.

Going the other way is extraordinarily difficult - you can't really separate the bread back into flour, water, yeast - some of that was lost during the baking process, and you can never tell exactly how much water or flour or yeast was used for a particular loaf, because that information was destroyed by the hashing function (aka the oven).

Many different variants of inputs will theoretically produce identical loaves (e.g. 2 cups of water and 1 tsbp of yeast produce exactly the same loaf as 2.1 cups of water and 0.9tsbp of yeast), but given one of those loaves, you can't tell exactly what combo of inputs produced it.

Encryption, on the other hand, could be viewed as a safe deposit box. Whatever you put in there comes back out, as long as you possess the key with which it was locked up in the first place. It's a symmetric operation. Given a key and some input, you get a certain output. Given that output, and the same key, you'll get back the original input. It's a 1:1 mapping.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

17.9K

Likes

78

Duration

1:41

Published

Mar 11, 2015

User Reviews

4.0
(3)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.