Post
Topic
Board Hardware
Re: The performance claims and prices are unrealistic
by
pcm81
on 29/01/2013, 03:48:50 UTC
SHA-256 is used to encrypt data

How does that work? Show me how to decrypt a SHA256 hash back to its original contents.
Step 1, generate random contents
Step 2, hash it
Step 3, compare to a known hash. If matches and random contents makes sense you done, if does not match loop to step 1.
In reality this is an infinite loop that produces no results.  It is more likely that all of the oxygen in the room you are in is distributed poorly and none of it is near you.
I am going to say that you have made the most elegant comeback I have ever read in a long while.

You are a rising star in my book!

Last I checked, hashing and encryption are two different things. They only barely resemble one another on a superficial level.

Hashing and encryption ARE two different things. In fact though, they are both used when you log into your online banking account.
1. Your computer gets the public RSA key of the server and encrypts the AES key with it.
2. Sends the key to the server together with your password, which is encrypted with AES.
3. Server decrypts AES key, using that key decrypts your password, it hashes your password and compares the resulting hash to its stored hash. If two match, you are authenticated.
Server does not actually store your password, just its hash, this way if hacker steals the list of all password hashes, he still cant log in...