SlideShare a Scribd company logo
1 of 8
ENCODING VS.
ENCRYPTION VS.
HASHING
MUHAMMAD FATHY
ELBERMAWY
Encoding
 Encoding is for maintaining data usability
and can be reversed by employing the
same algorithm that encoded the content,
i.e. no key is used.
Encoding Examples
 Hotel Room Number
– 312 (3rd floor, 12th room)
– 009 (0 floor, 9th room)
 Metro Ticket
 Base64 (PHP)
 Minify JS/CSS
 HTML URL Encoding
Egyptian National ID
Ex. 2 8 2 0 8 1 5 1 3 0 4 5 9 7
Code C Y Y M M D D X X Z Z Z Z1 C1
Desc. Century
code
Year
number
Month
number
Day
number
Governorate
code
Insertion
number
Gender
code
Check
Digit
Cairo 01 Alexandria 02 Port Said 03 Suez 04 Damietta 11
Dakahlia 12 Sharqia 13 Qalyubia 14 Kafr el-Sheikh 15 Gharbia 16
Monufia 17 Beheira 18 Ismailia 19 Giza 21 Beni Suef 22
Faiyum 23 Minya 24 Asyut 25 Sohag 26 Qena 27
Aswan 28 Luxor 29 Red Sea 31 New Valley 32 Matruh 33
North Sinai 34 South Sinai 35 Outside Egypt 88
Century code: 1= 1800 ~ 1899, 2= 1900 ~ 1999, 3 = 2000 ~ 2099
Gender code: Even = Female, Odd = Male
Encryption
 Encryption is for maintaining data
confidentiality and requires the use of a key
(kept secret) in order to return to plaintext.
Encryption Examples
 One Time Key Encryption
– Change password
 Key Encryption (Symmetric encryption)
– Blowfish
• https://en.wikipedia.org/wiki/Blowfish_(cipher)
– AES
• https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
 Public/Private Key Encryption (Asymmetric
encryption)
– RSA
• https://en.wikipedia.org/wiki/RSA
– ElGamal
• https://en.wikipedia.org/wiki/ElGamal_encryption
Hashing
 Hashing is for validating the integrity of content by detecting
all modification thereof via obvious changes to the hash
output.
 MD5 (Collision problem)
– https://en.wikipedia.org/wiki/MD5
– https://en.wikipedia.org/wiki/MD5#Collision_vulnerabilities
– https://en.wikipedia.org/wiki/Collision_attack
 SHA-512 (SHA 2)
– https://en.wikipedia.org/wiki/SHA-2
– https://en.wikipedia.org/wiki/Comparison_of_cryptographic_hash_f
unctions
– https://en.wikipedia.org/wiki/Hash_function_security_summary
Thank You

More Related Content

Viewers also liked

Qué son las herramientas multimedia
Qué son las herramientas multimediaQué son las herramientas multimedia
Qué son las herramientas multimediaottop14
 
Hows that working for you
Hows that working for youHows that working for you
Hows that working for youMonica Post
 
Moda para este verano :D
Moda para este verano :DModa para este verano :D
Moda para este verano :DItzela Grey
 

Viewers also liked (7)

Il pendolo
Il pendoloIl pendolo
Il pendolo
 
Sally Liddell
Sally LiddellSally Liddell
Sally Liddell
 
Qué son las herramientas multimedia
Qué son las herramientas multimediaQué son las herramientas multimedia
Qué son las herramientas multimedia
 
GodmanGuildPresentation
GodmanGuildPresentationGodmanGuildPresentation
GodmanGuildPresentation
 
Android 1
Android  1Android  1
Android 1
 
Hows that working for you
Hows that working for youHows that working for you
Hows that working for you
 
Moda para este verano :D
Moda para este verano :DModa para este verano :D
Moda para este verano :D
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Encoding vs. encryption vs. hashing

  • 2. Encoding  Encoding is for maintaining data usability and can be reversed by employing the same algorithm that encoded the content, i.e. no key is used.
  • 3. Encoding Examples  Hotel Room Number – 312 (3rd floor, 12th room) – 009 (0 floor, 9th room)  Metro Ticket  Base64 (PHP)  Minify JS/CSS  HTML URL Encoding
  • 4. Egyptian National ID Ex. 2 8 2 0 8 1 5 1 3 0 4 5 9 7 Code C Y Y M M D D X X Z Z Z Z1 C1 Desc. Century code Year number Month number Day number Governorate code Insertion number Gender code Check Digit Cairo 01 Alexandria 02 Port Said 03 Suez 04 Damietta 11 Dakahlia 12 Sharqia 13 Qalyubia 14 Kafr el-Sheikh 15 Gharbia 16 Monufia 17 Beheira 18 Ismailia 19 Giza 21 Beni Suef 22 Faiyum 23 Minya 24 Asyut 25 Sohag 26 Qena 27 Aswan 28 Luxor 29 Red Sea 31 New Valley 32 Matruh 33 North Sinai 34 South Sinai 35 Outside Egypt 88 Century code: 1= 1800 ~ 1899, 2= 1900 ~ 1999, 3 = 2000 ~ 2099 Gender code: Even = Female, Odd = Male
  • 5. Encryption  Encryption is for maintaining data confidentiality and requires the use of a key (kept secret) in order to return to plaintext.
  • 6. Encryption Examples  One Time Key Encryption – Change password  Key Encryption (Symmetric encryption) – Blowfish • https://en.wikipedia.org/wiki/Blowfish_(cipher) – AES • https://en.wikipedia.org/wiki/Advanced_Encryption_Standard  Public/Private Key Encryption (Asymmetric encryption) – RSA • https://en.wikipedia.org/wiki/RSA – ElGamal • https://en.wikipedia.org/wiki/ElGamal_encryption
  • 7. Hashing  Hashing is for validating the integrity of content by detecting all modification thereof via obvious changes to the hash output.  MD5 (Collision problem) – https://en.wikipedia.org/wiki/MD5 – https://en.wikipedia.org/wiki/MD5#Collision_vulnerabilities – https://en.wikipedia.org/wiki/Collision_attack  SHA-512 (SHA 2) – https://en.wikipedia.org/wiki/SHA-2 – https://en.wikipedia.org/wiki/Comparison_of_cryptographic_hash_f unctions – https://en.wikipedia.org/wiki/Hash_function_security_summary