[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/biz/ - Business & Finance

Search:


View post   

>> No.54717340 [View]
File: 41 KB, 1251x601, Pic2.png [View same] [iqdb] [saucenao] [google]
54717340

>Hashing CONOPS
https://www.sentinelone.com/cybersecurity-101/hashing/
In last weeks discussion, we briefly covered hashes, and how they fit into PGP verification signatures, you will notice that the two concepts are similar in the way they work. Simply put, hashes are the text output of data that has been processed by an algorithm ex:SHA/MD5. The output hash is created by taking a file or piece of data, which can be represented in binary form, and running a complex mathematical algorithm on it. By running this algorithm on the data, we can expect to always return the identical output hash or checksum, no matter how many times we run it through the algorithm, This is the key principal behind file hash verification, if the file being verified is altered, even in the smallest way, the output hash of that file will not match that of the original.

Navigation
View posts[+24][+48][+96]