Encryption, hashing, and obfuscation

Discussion on encryption, data integrity, passwords, etc


Encryption, hashing, and obfuscation

Postby kostyanj » Tue Apr 08, 2003 11:27 pm


COMMENTARY--I can imagine a world where the computers needed no security. Where there were no passwords, no security checks, and no firewalls. Where the computers communicated freely and shared information rather than hiding it. I can also imagine the scoundrels of earth hacking that world’s net and stealing all their credit cards.

Unfortunately, that is our reality. In today’s world of interconnected networks: Secure it, or lose it. We don’t have the luxury of running insecure networks or exposing insecure data. Unfortunately, it’s often our task to sell that data and try to prevent those from seeing it to profit from our work.

That’s where encryption, hashing, and obfuscation come in. This article hopes to clear up some misconception in the industry as to how these technologies work and how they relate to each. In practice, they do not conflict at all. Simply put, each works best in a specific problem domain.

User avatar
Posts: 836
Joined: Thu Feb 27, 2003 4:08 am

Return to Encryption

Who is online

Users browsing this forum: No registered users and 1 guest