diff --git a/2024/10/20/books-that-inspire/index.html b/2024/10/20/books-that-inspire/index.html index d5e0182..0e21ed3 100644 --- a/2024/10/20/books-that-inspire/index.html +++ b/2024/10/20/books-that-inspire/index.html @@ -132,6 +132,7 @@

Helpful Tools diff --git a/2024/11/03/hashing-intro/index.html b/2024/11/03/hashing-intro/index.html new file mode 100644 index 0000000..ee3bae7 --- /dev/null +++ b/2024/11/03/hashing-intro/index.html @@ -0,0 +1,311 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Power of Hashing in modern secure communications · The Digital Sage + + + + + + + + +
+ +
+
+
+
+
+ + +
+
+ +
+
+
+ + +

In today’s world, hashing plays a fundamental role in securing our digital interactions. From protecting passwords to verifying data integrity, hashing is at the core of modern encrypted communications. In this article, we’ll dive into the essentials of hashing, explore its types, and look at its many real-world applications.

+

What is Hashing?

+

Hashing is a process that transforms input data (often called plaintext) of any length into a fixed-length string of characters. This transformation produces a “hash,” a unique fingerprint of the original data, typically represented by a string of letters and numbers.

+

The distinct feature of hashing is its irreversibility. Once data is hashed, you cannot easily revert it to its original form. This is because hashing is a one-way function. Although it’s technically possible to guess the input by brute force or through algorithmic flaws (in weaker hashing algorithms), good hashing algorithms are designed to make such efforts practically infeasible.

+

In hashing:

+
    +
  • For a given input, hashing will always produce the same output (deterministic).
  • +
  • The hashing process is designed to be computationally efficient, producing results quickly even with large inputs.
  • +
+

Hashing is therefore ideal for many security applications, particularly because of this unique combination of irreversibility, speed, and determinism.

+

For example, to hash a password like imaginary-password with the SHA-256 hashing algorithm, you can use the following command in Unix-based systems:

+
echo -n "imaginary-password" | shasum -a 256
+
+

This command produces a 256-bit (32-byte) hash value, which is the “fingerprint” of your input text.

+ + + + +

+ Like this post? Share on! + Twitter + ❄ Facebook + ❄ Email + + + + + + + + + + +


+ +
+
+
+

Published

+ + +

Hashing Series

+
    +
  • + Part 1: Power of Hashing in modern secure communications +
  • +
+

Category

+ Cloud Technologies +

Tags

+ +

Stay in Touch

+ + + + + + + + + + + + + +
+
+ +
+ +
+
+
+
+
+ + + + + + + + + + + + \ No newline at end of file diff --git a/archives.html b/archives.html index 34a8e95..d5ce2e2 100644 --- a/archives.html +++ b/archives.html @@ -73,6 +73,17 @@

All Posts

2024

+
+ + + Power of Hashing in modern secure communications + + +
+ +
diff --git a/author/sajal-sachdev.html b/author/sajal-sachdev.html index 7957f1d..df511fe 100644 --- a/author/sajal-sachdev.html +++ b/author/sajal-sachdev.html @@ -18,7 +18,7 @@ - + The Digital Sage - Articles by Sajal Sachdev @@ -99,6 +99,16 @@

My Projects

Recent Posts all posts

+
+ + Power of Hashing in modern secure communications + +
+ posted in + Cloud Technologies + +
+
Tech Wisdom: Books & Resources That Inspire and Elevate Our Tech Journey diff --git a/authors.html b/authors.html index ab18c14..7c96593 100644 --- a/authors.html +++ b/authors.html @@ -55,7 +55,7 @@
diff --git a/categories.html b/categories.html index a8a73eb..0d6681d 100644 --- a/categories.html +++ b/categories.html @@ -78,12 +78,20 @@

All Categories

+

cybersecurity

+ + +

encryption

+ +

kubernetes