diff --git a/2024/11/03/hashing-intro/index.html b/2024/11/03/hashing-intro/index.html index ee3bae7..f4ed308 100644 --- a/2024/11/03/hashing-intro/index.html +++ b/2024/11/03/hashing-intro/index.html @@ -94,7 +94,7 @@

Contents

-

In today’s world, hashing plays a fundamental role in securing our digital interactions. From protecting passwords to verifying data integrity, hashing is at the core of modern encrypted communications. In this article, we’ll dive into the essentials of hashing, explore its types, and look at its many real-world applications.

+

In today’s world, hashing plays a fundamental role in securing our digital interactions. From protecting passwords to verifying data integrity, hashing is at the core of modern encrypted communications. In this article series, we’ll dive into the essentials of hashing, explore its types, and look at its many real-world applications.

What is Hashing?

Hashing is a process that transforms input data (often called plaintext) of any length into a fixed-length string of characters. This transformation produces a “hash,” a unique fingerprint of the original data, typically represented by a string of letters and numbers.

The distinct feature of hashing is its irreversibility. Once data is hashed, you cannot easily revert it to its original form. This is because hashing is a one-way function. Although it’s technically possible to guess the input by brute force or through algorithmic flaws (in weaker hashing algorithms), good hashing algorithms are designed to make such efforts practically infeasible.

@@ -132,6 +132,7 @@

What is Hashing? + @@ -146,16 +147,19 @@

Hashing Series

  • Part 1: Power of Hashing in modern secure communications
  • +
  • + Part 2: Types of Hashing Algorithms +
  • Category

    Cloud Technologies

    Tags

    Stay in Touch

    diff --git a/2024/11/06/hashing-types/index.html b/2024/11/06/hashing-types/index.html new file mode 100644 index 0000000..16c23bf --- /dev/null +++ b/2024/11/06/hashing-types/index.html @@ -0,0 +1,324 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Types of Hashing Algorithms · The Digital Sage + + + + + + + + +
    + +
    +
    +
    +
    +
    + + +
    + +
    +
    + + +

    Hashing algorithms vary in complexity, security, and length of output. Here are some of the most widely used types:

    +
    MD5 (Message Digest Algorithm 5)
    +
      +
    • Produces a 128-bit hash.
    • +
    • It’s fast but vulnerable to collisions, meaning two different inputs can produce the same hash. Due to these vulnerabilities, MD5 is generally not recommended for secure applications today.
    • +
    +
    SHA-1 (Secure Hash Algorithm 1)
    +
      +
    • Produces a 160-bit hash.
    • +
    • SHA-1 was widely used in the past but is now considered insecure for most applications due to susceptibility to collision attacks.
    • +
    +
    SHA-2 (Secure Hash Algorithm 2)
    +
      +
    • A family of hash functions that includes SHA-256 (producing a 256-bit hash) and SHA-512 (producing a 512-bit hash).
    • +
    • SHA-256 is a highly secure and widely used hashing algorithm, particularly in cryptocurrency and digital certificates.
    • +
    +
    SHA-3 (Secure Hash Algorithm 3)
    +
      +
    • A newer standard designed to offer security even against advanced attacks. It’s computationally intensive but highly secure, often used in cryptographic applications that require maximum security.
    • +
    +

    Each of these algorithms are designed with specific trade-offs in mind between security, performance, and output size.

    + + + + +

    + Like this post? Share on! + Twitter + ❄ Facebook + ❄ Email + + + + + + + + + + +


    + +
    +
    +
    +

    Published

    + + +

    Hashing Series

    + +

    Category

    + Cloud Technologies +

    Tags

    + +

    Stay in Touch

    + + + + + + + + + + + + + +
    +
    + +
    + +
    +
    +
    +
    +
    + + + + + + + + + + + + \ No newline at end of file diff --git a/archives.html b/archives.html index d5ce2e2..2061c47 100644 --- a/archives.html +++ b/archives.html @@ -73,6 +73,17 @@

    All Posts

    2024

    +
    + + + Types of Hashing Algorithms + + +
    + +
    diff --git a/author/sajal-sachdev.html b/author/sajal-sachdev.html index df511fe..9041712 100644 --- a/author/sajal-sachdev.html +++ b/author/sajal-sachdev.html @@ -90,6 +90,11 @@

    My Projects

    Boosting Kubernetes Filesystem Workflows A guide to using Kubernetes for filesystem workflows +
    @@ -99,6 +104,16 @@

    My Projects

    Recent Posts all posts

    +
    + + Types of Hashing Algorithms + +
    + posted in + Cloud Technologies + +
    +
    Power of Hashing in modern secure communications diff --git a/authors.html b/authors.html index 7c96593..411e669 100644 --- a/authors.html +++ b/authors.html @@ -55,7 +55,7 @@
    diff --git a/categories.html b/categories.html index 0d6681d..0698013 100644 --- a/categories.html +++ b/categories.html @@ -78,12 +78,20 @@

    All Categories

    @@ -99,6 +104,16 @@

    My Projects

    Recent Posts all posts

    diff --git a/feeds/all.atom.xml b/feeds/all.atom.xml index f93c210..34043c7 100644 --- a/feeds/all.atom.xml +++ b/feeds/all.atom.xml @@ -1,6 +1,27 @@ -The Digital Sagehttps://Don-cloud.github.io/2024-11-03T10:42:00+01:00Power of Hashing in modern secure communications2024-11-03T10:42:00+01:002024-11-03T10:42:00+01:00Sajal Sachdevtag:don-cloud.github.io,2024-11-03:/2024/11/03/hashing-intro/<p>Role of Hashing Introduction</p> -<p>In today’s world, hashing plays a fundamental role in securing our digital interactions. From protecting passwords to verifying data integrity, hashing is at the core of modern encrypted communications. In this article, we’ll dive into the essentials of hashing, explore its types, and look at its many real-world applications.</p> +The Digital Sagehttps://Don-cloud.github.io/2024-11-06T18:40:00+01:00Types of Hashing Algorithms2024-11-06T18:40:00+01:002024-11-06T18:40:00+01:00Sajal Sachdevtag:don-cloud.github.io,2024-11-06:/2024/11/06/hashing-types/<p>Role of Hashing Introduction</p> +<p>Hashing algorithms vary in complexity, security, and length of output. Here are some of the most widely used types:</p> +<h6 id="md5-message-digest-algorithm-5">MD5 (Message Digest Algorithm 5)<a class="headerlink" href="#md5-message-digest-algorithm-5" title="Permanent link">¶</a></h6> +<ul> +<li>Produces a 128-bit hash.</li> +<li>It’s fast but vulnerable to collisions, meaning two different inputs can produce the same hash. Due to these vulnerabilities, MD5 is generally not recommended for secure applications today.</li> +</ul> +<h6 id="sha-1-secure-hash-algorithm-1">SHA-1 (Secure Hash Algorithm 1)<a class="headerlink" href="#sha-1-secure-hash-algorithm-1" title="Permanent link">¶</a></h6> +<ul> +<li>Produces a 160-bit hash.</li> +<li>SHA-1 was widely used in the past but is now considered insecure for most applications due to susceptibility to collision attacks.</li> +</ul> +<h6 id="sha-2-secure-hash-algorithm-2">SHA-2 (Secure Hash Algorithm 2)<a class="headerlink" href="#sha-2-secure-hash-algorithm-2" title="Permanent link">¶</a></h6> +<ul> +<li>A family of hash functions that includes SHA-256 (producing a 256-bit hash) and SHA-512 (producing a 512-bit hash).</li> +<li>SHA-256 is a highly secure and widely used hashing algorithm, particularly in cryptocurrency and digital certificates.</li> +</ul> +<h6 id="sha-3-secure-hash-algorithm-3">SHA-3 (Secure Hash Algorithm 3)<a class="headerlink" href="#sha-3-secure-hash-algorithm-3" title="Permanent link">¶</a></h6> +<ul> +<li>A newer standard designed to offer security even against advanced attacks. It’s computationally intensive but highly secure, often used in cryptographic applications that require maximum security.</li> +</ul> +<p>Each of these algorithms are designed with specific trade-offs in mind between security, performance, and output size.</p>Power of Hashing in modern secure communications2024-11-03T10:42:00+01:002024-11-03T10:42:00+01:00Sajal Sachdevtag:don-cloud.github.io,2024-11-03:/2024/11/03/hashing-intro/<p>Role of Hashing Introduction</p> +<p>In today’s world, hashing plays a fundamental role in securing our digital interactions. From protecting passwords to verifying data integrity, hashing is at the core of modern encrypted communications. In this article series, we’ll dive into the essentials of hashing, explore its types, and look at its many real-world applications.</p> <h2 id="what-is-hashing">What is Hashing?<a class="headerlink" href="#what-is-hashing" title="Permanent link">¶</a></h2> <p>Hashing is a process that transforms input data (often called plaintext) of any length into a fixed-length string of characters. This transformation produces a “hash,” a unique fingerprint of the original data, typically represented by a string of letters and numbers.</p> <p>The distinct feature of hashing is its <strong>irreversibility</strong>. Once data is hashed, you cannot easily revert it to its original form. This is because hashing is a <strong>one-way function</strong>. Although it’s technically possible to guess the input by brute force or through algorithmic flaws (in weaker hashing algorithms), good hashing algorithms are designed to make such efforts practically infeasible.</p> diff --git a/feeds/cloud-technologies.atom.xml b/feeds/cloud-technologies.atom.xml index a402da6..9c001ec 100644 --- a/feeds/cloud-technologies.atom.xml +++ b/feeds/cloud-technologies.atom.xml @@ -1,6 +1,27 @@ -The Digital Sage - Cloud Technologieshttps://Don-cloud.github.io/2024-11-03T10:42:00+01:00Power of Hashing in modern secure communications2024-11-03T10:42:00+01:002024-11-03T10:42:00+01:00Sajal Sachdevtag:don-cloud.github.io,2024-11-03:/2024/11/03/hashing-intro/<p>Role of Hashing Introduction</p> -<p>In today’s world, hashing plays a fundamental role in securing our digital interactions. From protecting passwords to verifying data integrity, hashing is at the core of modern encrypted communications. In this article, we’ll dive into the essentials of hashing, explore its types, and look at its many real-world applications.</p> +The Digital Sage - Cloud Technologieshttps://Don-cloud.github.io/2024-11-06T18:40:00+01:00Types of Hashing Algorithms2024-11-06T18:40:00+01:002024-11-06T18:40:00+01:00Sajal Sachdevtag:don-cloud.github.io,2024-11-06:/2024/11/06/hashing-types/<p>Role of Hashing Introduction</p> +<p>Hashing algorithms vary in complexity, security, and length of output. Here are some of the most widely used types:</p> +<h6 id="md5-message-digest-algorithm-5">MD5 (Message Digest Algorithm 5)<a class="headerlink" href="#md5-message-digest-algorithm-5" title="Permanent link">¶</a></h6> +<ul> +<li>Produces a 128-bit hash.</li> +<li>It’s fast but vulnerable to collisions, meaning two different inputs can produce the same hash. Due to these vulnerabilities, MD5 is generally not recommended for secure applications today.</li> +</ul> +<h6 id="sha-1-secure-hash-algorithm-1">SHA-1 (Secure Hash Algorithm 1)<a class="headerlink" href="#sha-1-secure-hash-algorithm-1" title="Permanent link">¶</a></h6> +<ul> +<li>Produces a 160-bit hash.</li> +<li>SHA-1 was widely used in the past but is now considered insecure for most applications due to susceptibility to collision attacks.</li> +</ul> +<h6 id="sha-2-secure-hash-algorithm-2">SHA-2 (Secure Hash Algorithm 2)<a class="headerlink" href="#sha-2-secure-hash-algorithm-2" title="Permanent link">¶</a></h6> +<ul> +<li>A family of hash functions that includes SHA-256 (producing a 256-bit hash) and SHA-512 (producing a 512-bit hash).</li> +<li>SHA-256 is a highly secure and widely used hashing algorithm, particularly in cryptocurrency and digital certificates.</li> +</ul> +<h6 id="sha-3-secure-hash-algorithm-3">SHA-3 (Secure Hash Algorithm 3)<a class="headerlink" href="#sha-3-secure-hash-algorithm-3" title="Permanent link">¶</a></h6> +<ul> +<li>A newer standard designed to offer security even against advanced attacks. It’s computationally intensive but highly secure, often used in cryptographic applications that require maximum security.</li> +</ul> +<p>Each of these algorithms are designed with specific trade-offs in mind between security, performance, and output size.</p>Power of Hashing in modern secure communications2024-11-03T10:42:00+01:002024-11-03T10:42:00+01:00Sajal Sachdevtag:don-cloud.github.io,2024-11-03:/2024/11/03/hashing-intro/<p>Role of Hashing Introduction</p> +<p>In today’s world, hashing plays a fundamental role in securing our digital interactions. From protecting passwords to verifying data integrity, hashing is at the core of modern encrypted communications. In this article series, we’ll dive into the essentials of hashing, explore its types, and look at its many real-world applications.</p> <h2 id="what-is-hashing">What is Hashing?<a class="headerlink" href="#what-is-hashing" title="Permanent link">¶</a></h2> <p>Hashing is a process that transforms input data (often called plaintext) of any length into a fixed-length string of characters. This transformation produces a “hash,” a unique fingerprint of the original data, typically represented by a string of letters and numbers.</p> <p>The distinct feature of hashing is its <strong>irreversibility</strong>. Once data is hashed, you cannot easily revert it to its original form. This is because hashing is a <strong>one-way function</strong>. Although it’s technically possible to guess the input by brute force or through algorithmic flaws (in weaker hashing algorithms), good hashing algorithms are designed to make such efforts practically infeasible.</p> diff --git a/index.html b/index.html index 368c0d7..a696c6e 100644 --- a/index.html +++ b/index.html @@ -91,6 +91,11 @@

    My Projects

    Boosting Kubernetes Filesystem Workflows A guide to using Kubernetes for filesystem workflows +
    @@ -100,6 +105,16 @@

    My Projects

    Recent Posts all posts

    +
    + + Types of Hashing Algorithms + +
    + posted in + Cloud Technologies + +
    +
    Power of Hashing in modern secure communications diff --git a/search-index.st b/search-index.st index 138d387..2450f38 100644 Binary files a/search-index.st and b/search-index.st differ diff --git a/search.toml b/search.toml index 3a74dbc..254f793 100644 --- a/search.toml +++ b/search.toml @@ -2,6 +2,11 @@ html_selector = "main" base_directory = "/home/don/repos/projects/blogoutput" +[[input.files]] +path = "2024/11/06/hashing-types/index.html" +url = "/2024/11/06/hashing-types/" +title = "Types of Hashing Algorithms" + [[input.files]] path = "2024/11/03/hashing-intro/index.html" url = "/2024/11/03/hashing-intro/" diff --git a/sitemap.xml b/sitemap.xml index 86df5a7..9d2026c 100644 --- a/sitemap.xml +++ b/sitemap.xml @@ -5,53 +5,60 @@ xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"> https://Don-cloud.github.io/404.html -2024-11-04T10:54:24-00:00 +2024-11-06T10:22:27-00:00 weekly 0.5 https://Don-cloud.github.io/ -2024-11-04T10:54:24-00:00 +2024-11-06T10:22:27-00:00 weekly 0.5 https://Don-cloud.github.io/tags.html -2024-11-04T10:54:24-00:00 +2024-11-06T10:22:27-00:00 weekly 0.5 https://Don-cloud.github.io/categories.html -2024-11-04T10:54:24-00:00 +2024-11-06T10:22:27-00:00 weekly 0.5 https://Don-cloud.github.io/authors.html -2024-11-04T10:54:24-00:00 +2024-11-06T10:22:27-00:00 weekly 0.5 https://Don-cloud.github.io/archives.html -2024-11-04T10:54:24-00:00 +2024-11-06T10:22:27-00:00 weekly 0.5 https://Don-cloud.github.io/search.html -2024-11-04T10:54:24-00:00 +2024-11-06T10:22:27-00:00 weekly 0.5 + +https://Don-cloud.github.io/2024/11/06/hashing-types/ +2024-11-06T18:40:00+01:00 +weekly +0.6 + + https://Don-cloud.github.io/2024/11/03/hashing-intro/ 2024-11-03T10:42:00+01:00 @@ -82,7 +89,7 @@ xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"> https://Don-cloud.github.io/category/cloud-technologies.html -2024-11-03T10:42:00+00:50 +2024-11-06T18:40:00+00:50 weekly 0.5 @@ -96,14 +103,14 @@ xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"> https://Don-cloud.github.io/tag/encryption.html -2024-11-03T10:42:00+00:50 +2024-11-06T18:40:00+00:50 weekly 0.5 https://Don-cloud.github.io/tag/cybersecurity.html -2024-11-03T10:42:00+00:50 +2024-11-06T18:40:00+00:50 weekly 0.5 @@ -138,7 +145,7 @@ xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"> https://Don-cloud.github.io/author/sajal-sachdev.html -2024-11-03T10:42:00+00:50 +2024-11-06T18:40:00+00:50 weekly 0.5 diff --git a/tag/books.html b/tag/books.html index b1243f8..390bdb9 100644 --- a/tag/books.html +++ b/tag/books.html @@ -90,6 +90,11 @@

    My Projects

    Boosting Kubernetes Filesystem Workflows A guide to using Kubernetes for filesystem workflows +
    diff --git a/tag/cybersecurity.html b/tag/cybersecurity.html index aeeaf53..7704b8a 100644 --- a/tag/cybersecurity.html +++ b/tag/cybersecurity.html @@ -90,6 +90,11 @@

    My Projects

    Boosting Kubernetes Filesystem Workflows A guide to using Kubernetes for filesystem workflows + @@ -99,6 +104,16 @@

    My Projects

    Recent Posts all posts

    +
    + + Types of Hashing Algorithms + +
    + posted in + Cloud Technologies + +
    +
    Power of Hashing in modern secure communications diff --git a/tag/encryption.html b/tag/encryption.html index b232d01..d2c7d42 100644 --- a/tag/encryption.html +++ b/tag/encryption.html @@ -90,6 +90,11 @@

    My Projects

    Boosting Kubernetes Filesystem Workflows A guide to using Kubernetes for filesystem workflows +
    @@ -99,6 +104,16 @@

    My Projects

    Recent Posts all posts

    +
    + + Types of Hashing Algorithms + +
    + posted in + Cloud Technologies + +
    +
    Power of Hashing in modern secure communications diff --git a/tag/kubernetes.html b/tag/kubernetes.html index aa8e611..29148d4 100644 --- a/tag/kubernetes.html +++ b/tag/kubernetes.html @@ -90,6 +90,11 @@

    My Projects

    Boosting Kubernetes Filesystem Workflows A guide to using Kubernetes for filesystem workflows +
    diff --git a/tag/leadership.html b/tag/leadership.html index 7b7efad..92bb271 100644 --- a/tag/leadership.html +++ b/tag/leadership.html @@ -90,6 +90,11 @@

    My Projects

    Boosting Kubernetes Filesystem Workflows A guide to using Kubernetes for filesystem workflows + diff --git a/tag/sidecar.html b/tag/sidecar.html index ed16a05..1c792a3 100644 --- a/tag/sidecar.html +++ b/tag/sidecar.html @@ -90,6 +90,11 @@

    My Projects

    Boosting Kubernetes Filesystem Workflows A guide to using Kubernetes for filesystem workflows + diff --git a/tags.html b/tags.html index 7b6bc1c..4e0eeb8 100644 --- a/tags.html +++ b/tags.html @@ -78,10 +78,10 @@

    All Tags

    books1
  • - cybersecurity1 + cybersecurity2
  • - encryption1 + encryption2
  • kubernetes1 @@ -112,6 +112,14 @@

    books

    cybersecurity