Completion requirements
A hash is a cryptographic algorithm, but it differs from symmetric and asymmetric cryptography in that it does not use a public or private key. The input to a hash cannot be reverse calculated from the hash. Watch this video and note the computational and inversion requirements of a hash. Does hashing provide for confidentiality or integrity?
Source: https://www.youtube.com/watch?v=gV6eYfgGp4o This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Friday, 26 July 2024, 2:57 PM