I know you gotta store the passwords hashed but doesn’t that just move the goalposts? How come someone can’t use the hashed end result to get into the service it was used for?
I know you gotta store the passwords hashed but doesn’t that just move the goalposts? How come someone can’t use the hashed end result to get into the service it was used for?
Imagine you write a message but you scramble the letters around so that only the person you’re sending it to can read it -That’s encryption.
It’s not impossible that someone smart could unscramble those letters by figuring out the words the letters add up to spelling -That’s decryption.
So to trick them you added random letters so that they don’t know which ones are part of the message and which are not -thats a hash.
The main difference between encryption and hashing is that hashing only works in one direction, while encryption is meant to be decrypted later. With hashing, you can create a special combination from a password or something, then you can test for that same initial password by using the same hash process on new input.