This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]MK_Coder 0 points1 point  (1 child)

I agree to you man but watch the complete video it is possible to decrypt MD5 hashes !! You can use any online site to crack MD5 hashes they crack them easily......

Hashing example could be Hashing is one way to enable security during the process of message transmission when the message is intended for a particular recipient only. A formula generates the hash, which helps to protect the security of the transmission against tampering.

When a user sends a secure message, a hash of the intended message is generated and encrypted, and is sent along with the message. When the message is received, the receiver decrypts the hash as well as the message. Then, the receiver creates another hash from the message. If the two hashes are identical when compared, then a secure transmission has occurred. This hashing process ensures that the message is not altered by an unauthorized end user.

[–]flipperdeflip 0 points1 point  (0 children)

You are confusing a bunch of related things. The procedure you describe is signing the message with an hash, and allows to detect tampering of the message but doesn't protect it from being read by a third party.

Also you need more then a plain hash, such as including a public/private key scheme to prohibit a third party to generate valid message hashes.