Skip to main content

what is a hash in cryptography? and Types Of Hash Salt?

Namaste Hackers,
 


In Today's Post, You Will Learn About What Is Hash In Cryptography? And Other Small Queries Related To Hash.

So, Let's Start Our Post With Some Basic Queries

Introduction Of Hash Algorithms

 

 

Q 1. What Is Hash Salt?


Ans. In Simple Words, Hash Or Salt Is a Special Technique That Allow You Only Encryption Of Data, Means Hash Algorithms Not Allow Decryption Of Hashed Data. Basically, In This Concept Hash use Specially Design Mathematical Random Algorithm That Always Provides Same Encrypted Cipher Of Same Data, Every Time. But Interesting Thing is That, Because Of Its Special Random Design, Reverse Of Hash Algorithm Is Nearly Impossible. And Another Important Point Is, Hash Algorithm Takes Input of arbitrary length but output is always of fixed length. So, That's Why Hash Algorithms Are Extremely Useful In Cryptography.


Q 2. Importance Of Hash Algorithms?


Ans. Hash Are One Of The Most Popular Facility In Modern Cryptography because With The Help Of These Hashes, Anyone can Store Its Confidential Password And Other Login Data In Any Database Using Cryptography Hash Algorithms Without Worrying About Data Leakage. In Short, Modern Websites Use These Types Of Hashes To Store Login Passwords In Database Because With Hashed Database, A Hacker Can't Get Real Password In Plain Text That Much Simply Even After Hacking Any Database. Basically, A Website Create A Hash Values Of User Passwords And Store That Value In Database as a Reference Of Password and Whenever, User Enter Its Login Password, Website Again Calculate Hash Of Its Enter Password and Then Match That hash value With Saved Password In Database. This Process Makes Password Verifying Process More Secure And Easy. Even Every Security Expert Always Preferred Hash Algorithms Again Plain Text Password storage.  



Q 3. Types Of Hash Salts?


Ans. Well In Modern World Cryptography Is Actively Developing And Increasing Its Power Of Security And That's Why Their Are Several Types Of Hashes Are Available But Here, I Am Only Representing few Most Popular Hash Algorithms.

1. MD5 (Message Digest 5)
2. MD4 (Message Digest 4)
3. SHA256 (Secure Hash Function 256-bit)
4. WhirlPool


Conclusion :

                  Hash Algorithms Are The Best Way To Store Password In Database Against Plain Text Storage.


Written By
                SSB

Comments

Related Post

Top Visited

Create Simple Packet Sniffer Using Python

how to install burp suite in Linux/Ubuntu 16.04

Big List Of Google Dorks For Sqli Injection

List of Keyboard Shortcuts Keys for GNOME Desktop (Kali linux / Linux / Ubuntu/*nix )

How to create Phishing Page Using Kali Linux | Webpage Page Cloning Using Kali Linux Social Engineering Toolkit

Latest Google Dorks List

What is the use of Pseudo header in TCP/UDP packets?

Best 1000 User-agents List For Web Scraping

How To Install GDB Peda?

how to configure burpsuite with firefox?