Cryptography

Cryptography protects data through hashing and encryption.

Overview

One-way cryptography uses hash functions to transform data so the original value cannot be practically restored. Two-way cryptography encrypts data so it can be decrypted later with the correct key. Hashing is common for integrity checks and password verification, while encryption is used when data must be recovered.

Key Points

  • Keep credentials and tokens protected.
  • Prefer current standards and well-maintained libraries.
  • Validate trust boundaries and expiration rules.