What is Hashing & Salting of Password

What is Hashing & Salting of Password | Encryption and Cryptography #whatishacking #whatistwostepverification #howgmailhackbyhacker #rainbowtable #bruteforc...

ESXIOFFICE - Cyber Security Insights0 views28:21

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

About this video

What is Hashing & Salting of Password | Encryption and Cryptography #whatishacking #whatistwostepverification #howgmailhackbyhacker #rainbowtable #bruteforcehacking #dictionaryhacking #howaeroplanewifiwork "Hashing & Salting of Passwords: Hashing and salting are essential techniques used to enhance the security of passwords in computer systems. Hashing involves converting a password or any other input into a fixed-length string of characters using a mathematical algorithm. This process generates a unique hash value that represents the original data. One crucial aspect of hashing is its one-way nature, meaning that it is computationally infeasible to reverse the process and obtain the original input from the hash value. This property makes hashing ideal for securely storing passwords in databases. Salting is a technique used in conjunction with hashing to further strengthen password security. It involves adding a random value, known as a salt, to the input before hashing. The salt ensures that even if two users have the same password, their hash values will be different due to the unique salt added to each password. This effectively mitigates against common attacks such as precomputed rainbow tables, where attackers attempt to crack multiple passwords simultaneously. Encryption and Cryptography: Encryption is the process of encoding information in such a way that only authorized parties can access it. It involves converting plaintext (original data) into ciphertext (encoded data) using an encryption algorithm and a secret key. Encryption is widely used to protect sensitive data during transmission over networks or when stored on storage devices. Cryptography is the science of secure communication and is closely related to encryption. It encompasses various techniques and protocols aimed at ensuring confidentiality, integrity, and authenticity of data. Cryptographic algorithms are classified into two main categories: symmetric encryption, where the same key is used for both encryption and decryption, and asymmetric encryption, where different keys are used for encryption and decryption. Together, hashing, salting, encryption, and cryptography form the cornerstone of modern security practices, providing robust protection against unauthorized access and data breaches." * Copyright Disclaimer, allowance is made for "fair use" for purposes such as criticism, commenting, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favour of fair use. - This video has no negative impact on the original works (It would actually be positive for them) - This video is also for teaching purposes. - It is transformative in nature. - I only used bits and pieces of videos to get the point across where necessary. I do not own the rights to these audio clips. They have been used, in accordance with fair use, been repurposed with the intent of educating and inspiring others.

Video Information

Views
0

Total views since publication

Duration
28:21

Video length

Published
Jun 11, 2024

Release date

Quality
hd

Video definition