Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

What is the difference between hashing and encryption? Define algorithms for each.

Confidentiality, Integrity, and Authentication (CIA) is the key concern for every network security architect when designing security topologies. The first deals with securing the transit data itself, the second deals with securing the transit data from tampering with, and the third deals with securing the data from unauthorized access. Hashing and encryption are processes that solve these issues.

user-image
Question added by Ahmad Yassein , Infrastructure Network Manager , Ministry of International Cooperation (MIC)
Date Posted: 2013/11/26
Girish Vyas
by Girish Vyas , Security Engineer , Virtela Technology Services Inc

What is it ?

 

Hashing is a process to maintain integrity of data while encryption is process of maintaining confidentiality of data.

 

How does it work?

 

Hashing requires you to use hashing algorithm like MD5 / SHA.

 

On sender side

The raw data is hashed by using one of the algo's and then sent over to other side with raw data and its hashed value.

 

On received side

The receiver receives the data and calculates the hash value again using the same algo as done previously (The algo to be used for the process is already communicated ). This new value is compared with the old value sent by the sender and if it is the same, indicates that the data was not hampered in transit and integrity is maintained.

 

While encryption on the other hand is used to provide confidentiality, meaning the data is not readable by unauthorised person

 

For encryption to work, it requires one of encryption algo DES,3DES, RSA, DSA, or AES The encryption has2 mode block mode and stream mode.

 

The sender uses a key to encrypt (lock) the data and sends the encrypted data over an covert channel. During the transit only the person authorised will be able to get the data in readable format even if the data is wire taped.

 

On receiver side, the data is unencrypted/decrypted (unlocked) by using the same key it was locked if symmetric algo is used ( the one specified above are symmetric in nature except for RSA and DSA) and with a different key if asymmetric algo is used ( e.g. RSA or DSA).

 

For efficient communication both Encryption and hashing should be used to maintain the CIA triad.

hicham dachir
by hicham dachir , developement engineer , ELIT

cryptography: to protect data from reading ,just how have decrypting password :DES AES RSA RC4 

 

hashing: to guarantee the data not change in network :SHA-1 MD5 

Amod Joshi
by Amod Joshi , 2xCCIE R&S and Data Center# Lead Network Engineer , Fair Isaac Software (FICO)

Encryption is reversible through decryption and hashing is not

 

 

ASHRAF KARAYMEH
by ASHRAF KARAYMEH , Asociate Director , KPMG

hashing is a one way function (irreversible) used to provide integrity to transmitted data 

Encryption is a function  used to provide confusion and diffusion to the data so that it will be very hard mathematically or computationally to guess what is the data.

valuable (sensitive) data must be encrypted to maintain its confidentiality

any data can be hashed to prove that the data is genuine and has never been tampered or missed with. 

More Questions Like This