Introduction to Hashing and
Cryptography
Understanding Data
Security Techniques
Objectives
Explain the concept and importance of hashing in data
security.
Describe cryptography principles and their role in securing
information.
Differentiate between various network tools, hashing
techniques, and cryptographic methods.
Demonstrate basic use cases of hashing and cryptography
in real-world scenarios.
• Hashing is a process that
converts data into a fixed-
What is size unique string. It
Hashing? ensures data integrity and
security.
Protects data integrity
Importance Efficient data retrieval
of Hashing
Prevents unauthorized
modifications
How Hashing Works
Steps on Hashing Process
1. Input data is 2. Produces a fixed- 3. Any change in input
processed through a length hash value. results in a completely
hash function. different hash.
Message Digest (MD) Algorithms
MD5: 128-bit hash, used for
checksums and integrity checks but
weak.
MD4: Older than MD5, now obsolete
due to security flaws.
• SHA-1: 160-bit hash, used in
SHA SSL but now deprecated.
• SHA-2: Includes SHA-224,
(Secure
SHA-256, SHA-384, SHA-
Hash 512, used in digital
Algorithm) signatures & security.
Family • SHA-3: Newer, stronger
cryptographic standard.
Bcrypt
A password hashing algorithm with built-in
salting.
Purpose: Secure password storage, prevents
brute-force attacks.
Argon2
Modern key derivation function for password
hashing.
Secure password hashing with memory-hard
properties, resistant to attacks.
RIPEMD (RACE
Integrity RIPEMD-160,
Primitives
Evaluation
RIPEMD-256,
Message Digest) RIPEMD-320.
Digital signatures,
data integrity
verification.
Whirlpool
Cryptographic hash function producing a 512-bit
hash.
Used for file integrity verification and high-
security applications.
CRC32 (Cyclic Redundancy Check)
• Non-cryptographic checksum
algorithm.
• Used in network communication
and file integrity, but not secure.
Blake2 & Blake3
• Faster and more secure than
MD5 and SHA-2.
• Used in cryptographic
applications, file integrity, and
digital signatures.
• MD5: Fast but insecure.
• SHA-256: Strong security,
commonly used in
Comparison
blockchain.
of Hashing
• Argon2: Best for password
Algorithms
hashing.
• Bcrypt: Secure and widely
used for passwords.
What is
Cryptography?
• Cryptography is the
practice of securing
communication
through encoding and
decoding techniques.
Types of Cryptography
Symmetric Key Asymmetric Key
Cryptography (Same Cryptography
key for encryption & (Public & Private
decryption) key pairs)
Cryptographic Principles
Confidentiality: Ensuring only authorized access.
Integrity: Data remains unchanged during transmission.
Authentication: Verifies the identity of parties.
Non-repudiation: Prevents denial of actions.
Hashing vs. Encryption
Hashing: One-way function, Encryption: Two-way function,
irreversible. reversible with a key.
Network Tools for Security
Wireshark: OpenSSL: Encrypts
Hashcat: Cracks
Analyzes network and secures
hashed passwords.
traffic. communication.
Real-World Uses of Hashing
Password storage (e.g., bcrypt, SHA-256 in
databases)
Digital signatures (Verifying document
authenticity)
Blockchain (Ensuring transaction integrity)
Real-World Uses of Cryptography
Secure messaging Secure websites
Online banking
(End-to-end (SSL/TLS
security
encryption) certificates)
Demonstration: Hashing
Example
Demonstration: Encryption Example
Conclusion
01 02
Hashing and Understanding their
cryptography are use helps protect
essential in sensitive information.
cybersecurity.
Q&A
Thank you! <3