Encoding:
Encoding is not a security component, therefore no keys are used. Encoding is to maintain usability. It transforms data into another format so that it can be exchanged between different types of systems. It is a reversible process. Data encoding can be performed by using publicly available schema. Encoded data can be decoded by using the same schema which is used for encoding.
Examples of Encoding schema are: Unicode, Base64, Hex
Encryption:
Encryption is to maintain confidentiality of the data. It transforms plain text into cipher text which is not human understandable. An encryption algorithm with a secret key is used to encrypt the data. It is a reversible process (decryption), but can be done only by a particular user with the secret key and the algorithm used for encryption is known. Encryption is mainly categorized into two: Symmetric Key Encryption and Asymmetric Key Encryption. They are detailed here.
Examples of Encryption algorithms are: RSA, AES, DES, 3DES
Hashing:
Unlike Encoding & Encryption, Hashing is a one way process (irreversible) and it ensures integrity of data. Hashing of any variable length message produces a fixed length message digest or hash. It is almost impossible that two different messages will have the same hash, if this occurs it is called as a collision. Any minor change in the message results in extreme change in the generated hash.
Examples of Hashing algorithms are: MD5, SHA
Encoding is not a security component, therefore no keys are used. Encoding is to maintain usability. It transforms data into another format so that it can be exchanged between different types of systems. It is a reversible process. Data encoding can be performed by using publicly available schema. Encoded data can be decoded by using the same schema which is used for encoding.
Examples of Encoding schema are: Unicode, Base64, Hex
Encryption:
Encryption is to maintain confidentiality of the data. It transforms plain text into cipher text which is not human understandable. An encryption algorithm with a secret key is used to encrypt the data. It is a reversible process (decryption), but can be done only by a particular user with the secret key and the algorithm used for encryption is known. Encryption is mainly categorized into two: Symmetric Key Encryption and Asymmetric Key Encryption. They are detailed here.
Examples of Encryption algorithms are: RSA, AES, DES, 3DES
Hashing:
Unlike Encoding & Encryption, Hashing is a one way process (irreversible) and it ensures integrity of data. Hashing of any variable length message produces a fixed length message digest or hash. It is almost impossible that two different messages will have the same hash, if this occurs it is called as a collision. Any minor change in the message results in extreme change in the generated hash.
Examples of Hashing algorithms are: MD5, SHA
0 comments:
Post a Comment