If the key is lost the data cannot be unlocked

Explore discuss data innovations to drive business efficiency forward.
Post Reply
Bappy11
Posts: 455
Joined: Sun Dec 22, 2024 9:32 am

If the key is lost the data cannot be unlocked

Post by Bappy11 »

Conversely, if the key falls into someone else's hands, the data is vulnerable. Imagine your safe key being stolen—all the treasures inside are immediately at risk.

In addition, AES is less than ideal for storing passwords in a database. Why? Because encrypted data can be decrypted again if the key is known. This makes AES more suitable for protecting data that needs to be accessed again, not for verification such as logins.

Advantages of Hashing Algorithm
Hashing has advantages that make it a favorite for password security. First, it is one-way . Because buy phone number list the hash cannot be reversed, a thief who gets the hash cannot immediately know the original password. Second, the speed of verification . The system only needs to compare the hash, so the login process is faster.



Third, modern hashing like bcrypt has additional features like “salt”. Salt is random data added to the password before it is hashed, making it harder to crack with methods like rainbow tables. So, hashing is not only fast, but also smart in fighting threats.



Disadvantages of Hashing Algorithm


Unfortunately, hashing also has its downsides. One of them is brute force attacks . If your password is simple like “123456,” the hash can be guessed by trying every possible combination. Older algorithms like MD5 are also considered obsolete because they are vulnerable to “collisions”—two different inputs producing the same hash.
Post Reply