Hashing is a very different use of cryptography from encryption. In this video discover how it's used and explore the industry-leading algorithms MD5 and SHA.
- [Instructor] Hashing is a one-way mathematical function.…So think of encryption and decryption,…and the main goal of them is to garble some text…and then be able to retrieve that original text.…Hashing is the exact opposite.…We want to garble some text…and have there be no way to retrieve the original value.…So it's a one-way mathematical function.…It mutates a variable amount of data…into a fixed-length output,…meaning whether or not I give it a small amount of data…or a very large amount of data,…I'm going to get the same fixed-size output.…Hashing algorithms if they're well designed…mean a small input change causes a large output change.…
So what that means in practice…is if I take say the entire text of a 400-page novel,…so a large amount of data,…and I change just one letter of one word,…and I hash the original text and I hash the changed text,…where there's one letter of one word in those 400 pages.…The output of those two hashes…should be statistically different,…very different.…You would think that because a small change in the input,…
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks