Coding Encryption and Hashing
Coding Encryption and Hashing
Hashing
Differences and Applications
Coding
- Frequency Shift Keying (FSK)
- Phase Shift Keying (PSK)
- Quadrature Amplitude Modulation (QAM).
The main goal of wireless communication systems
to transmit the information (voice, text, video, Analog data to analog signal conversion
image, etc.) from source to destination through Analog data in electrical form can be transmitted as
wireless physical channel in correctly form. baseband signals easily and cheaply; this is done with
Coding is the basic method used to optimize the voice transmission over voice-grade lines.
communication system by converts the Examples:
- Amplitude Modulation (AM)
information or add extra bits.
- Frequency Modulation (FM)
Source Coding - Phase Modulation (PM)
Page 1
Coding, Encryption and Hashing
Encryption
public identity key, public session set-up key, and a
batch of public one-time session set-up keys to the
messaging service’s server and retains the
is the process of encoding a message or information corresponding set of private keys.
in such a way that only authorized parties can access
it and those who are not authorized cannot, and it's Virtual Private Network
widely used in almost everywhere and so there are It's a way of creating an Encrypted connection
many types of applications such as computer between a User and a site, VPNs operate by using
applications, software and hardware. They all symmetric cryptography to encrypt packets of data to
integrate encryption to accomplish objectives that be transmitted between central and remote locations,
users value. Here is a list of the most common and then embedding the encrypted packets in “outer”
applications: packets that are routed over the Internet.
Device locking
By defaults the data contained by a mobile device is
locked whenever the screen is locked and can be
accessed only by the user, it's a combination of
cryptographic passcode protection and full disk
encryption. The key needed to unlock the phone is a
combination of the user’s passcode and the phone’s
hardware key, so whenever a person tries to unlock
the phone the device gives a several numbers of
attempts before it gets locked by an iCloud or an
Email verification process.
Secure Massaging
Here in this application we use an End-to-End
protocol to prevent any chance of third parties such
as the service provider from getting these messages,
When a user registers for a messaging service, There
is a protocol called signal protocol used in :
WhatsApp, Facebook and even Messenger it sends a
Page 2
Coding, Encryption and Hashing
Hashing
Differences between coding, encryption
and hashing
I. Coding and encryption are reversible, while
Is generating a value or values from a string of text
hashing is un-reversible. Encryption is a two-way
using a mathematical function. Hashing is one way to
function; what is encrypted can be decrypted with
enable security during the process of message
the proper key. Hashing, however, is a one-way
transmission when the message is intended for a
function that scrambles plain text to produce a
particular recipient only. A formula generates the
unique message digest. with a properly designed
hash, which helps to protect the security of the
algorithm, there is no way to reverse the hashing
transmission against tampering. Hashing is also a
process to reveal the original password
method of sorting key values in a database table in an
II. Coding is used for improving the data while
efficient manner.
hashing and encryption are used for security
purposes.
How it works?
III. Coding is essential process, while encryption and
A user sends a secure message, a hash of the hashing are optional. Encryption and hashing used
intended message is generated and encrypted, and is to prevent the unauthorized access to data by
sent along with the message. When the message is changing the data and hiding it, while coding
received, the receiver decrypts the hash as well as improve the data transmission without hiding the
the message. Then, the receiver creates another hash original information
from the message. If the two hashes are identical
when compared, then a secure transmission has
occurred. This hashing process ensures that the
message is not altered by an unauthorized end user.
Hashing is used to index and retrieve items in a
References
database because it is easier to find the item using the
shortened hashed key than using the original value. [1] WIRELESS COMMUNICATIONS by Andrea
One of the main types of hashing is MD5...and it's the Goldsmith, Stanford University.
strongest type which can't be reversed even with [2] Data and computer communication by William
strong code generators. Stallings fifth edition
[3] https://www.nap.edu/read/25010/chapter/4#20
[4]
https://www.techopedia.com/definition/14316/hashing
[5] https://www.en.m.wikipedia.org/wiki/Encryption
Page 3