Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 662

WHY IS CRYPTOGRAPHY IMPORTANT FOR EVERY PROGRAMMER TO UNDERTAND? ( FREE COURSE )

by HOST - 08 August, 2022 - 01:40 AM
This post is by a banned member (HOST) - Unhide
HOST  
Infinity
1.922
Posts
319
Threads
4 Years of service
#1
(This post was last modified: 08 August, 2022 - 01:40 AM by HOST.)
If you're a nerd & programmer who has lots of spare time then you must learn Cryptography.
Cryptography is an important aspect of cybersecurity because it helps keep information secure.

Let's face it, the use of strong encryption is one way to keep data safe.
But why do programmers need to learn this?
It's necessary to understand how authentication works and, more importantly, which cryptographic protocols to use and which to avoid when creating applications that require sensitive information to be accessible.


1. Hash
What exactly is hashing? What exactly does it do? Hashing is the process of employing a mathematical function to turn an input of any length into a fixed-length string of text. This indicates that an algorithm can transform any text, no matter how long, into an array of numbers and letters.
A mathematical procedure is utilised to generate the new value using a hash function. A hash value, or simply a hash, is the result of a hash function.
A good hash function employs a one-way hashing algorithm, which means that the hash cannot be reversed into the original key.


2. Salts
Salts are brief, random strings of characters that are previously appended to the end of a user's passwords. They've been hashed, and our cats are cool, so any rainbow table attack will be thwarted. Maybe cats are cool in a database P hash close bracket exclamation mark said probably isn't. Remember that after a user enters their password, salts are automatically added. The user will be completely unaware that assault is being employed. Salts are often saved in plain text with a hashed output so that the website can determine which salt to use when verifying a login. This may appear counterintuitive because you're giving an attacker half the passwords, and you're right, brute force and dictionary assaults will still be a problem provided the attacker considers the salt and those who were about to use it in his guesses, but rainbow tables will be useless.

3. HMAC
In cryptography, a keyed hash message authentication code (HMAC) is a type of message authentication code (MAC) that employs both a cryptographic hash function (thus the 'H') and a secret cryptographic key. Like any other MAC, it can be used to verify both the data integrity and the legitimacy of a transmission. Any cryptographic hash function, such as MD5 or SHA-1, can be used to generate an HMAC, and the resulting MAC approach is known as HMAC-MD5 or HMAC-SHA1. The cryptographic strength of the HMAC is defined by the cryptographic strength of the underlying hash function, the size of its hash output, and the size and quality of the key.

FREE COURSES --> 
PDF
[Image: DBYzusT.png]

I do not own this contribution
Im just sharing 
Heart

This is a bump
Always confirm on cracked.io/@HOST
My contributions are either found online or personally tested, always use at your own\risk
 Impersonators 
https://cracked.io/Thread-IMPERSONATOR-ALERT-I-will-never-refuse-MM-on-site-PM
Before you shop read my
Terms of Agreement

[Image: GrNFh0g.png]
[Image: WpXHIC2.png]
This post is by a banned member (HOST) - Unhide
HOST  
Infinity
1.922
Posts
319
Threads
4 Years of service
Bumped #2
This is a bump
Always confirm on cracked.io/@HOST
My contributions are either found online or personally tested, always use at your own\risk
 Impersonators 
https://cracked.io/Thread-IMPERSONATOR-ALERT-I-will-never-refuse-MM-on-site-PM
Before you shop read my
Terms of Agreement

[Image: GrNFh0g.png]
[Image: WpXHIC2.png]

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)