Score
Title
858
How To Search ELI5: A Quick Reminder About Rule 7
14644
ELI5: Why do cars travel in packs on the highway, even when there are no traffic stops to create groups?
11
ELI5: Why are our fingertips, ear holes and nostrils all approximately the same size?
7
ELI5: Why do body parts (fingers, eyes, etc) twitch randomly?
11
ELI5 Retarded Time
4
ELI5: Umbral Moonshine
4
ELI5: Why do jet skis shoot a stream of water straight up when they go forward?
7
ELI5: Why are some sounds, like nails on a chalkboard, so universally hated by humans?
4
ELI5: How does ethylene make fruits and vegetables ripen faster?
3
ELI5: Why are solar gardens good investments for wealthy people?
3
ELI5: Why does a copied URL dirrct me yo a different page?
2
ELI5: Why is it not blinding to look directly at the sun early in a sun rise or late into a sun set?
2
ELI5 why is the polar star always north?
12
ELI5: How many ants does it take to make a functioning ant colony?
17
ELI5: SD. SS. SA. Gestapo. Wehrmacht. Sipo. Kripo. What were they all and how do they relate to each other?
4
ELI5: If I use the same amount of coffee grounds but more water, does my caffeine content change?
2
ELI5: Why do animals appear to care so much for their young, but not so much when the 'children' get older?
3
ELI5; What is the difference between a break and a fracture?
6
ELI5: Air movement in a house
2
ELI5: Why does the wind typically pick up during the middle of the day and die down in the evenings?
1
ELI5: Why does NASCAR race on oval tracks, rather than the more complicated layouts of other motorsports?
4
ELI5: How can sperm cells "swim" through something as thick as seminal fluid? You wouldn't be able to swim through honey for example.
4
ELI5: Why can't there be an "universe's point of reference" in relativism?
2
ELI5: Why do our eyes lose focus after staring at something for a while?
5
ELI5: Why/how can most species of animals hold their breath underwater for far longer than humans can?
1
ELI5: Risk Parity strategies in investing - how they work and what are the advantages/disadvantages?
1
ELI5: How is a bank started?
2
ELI5:Why is eating healthy 80% of being healthy?
1
ELI5: How is it possible to perceive a game servers tick rate going from 30 to 60 when your ping is not that fast?
5
ELI5: Objectively, what are the limitations of carbon dating?
1
ELI5: Security as a Service
0
ELI5: How do space shuttles launch off the modified 747s?
1
ELI5: What the hell is Umbral Moonshine?
8
ELI5: Why are cones and pyramids exactly 1/3 of a cylinder or prism's volume?
1
ELI5: How much does food affect building strength?
6
ELI5: What causes exhausts to have that rasp-y sound people tend to associate with tuners? (civics, integras, etc)
2
ELI5: Why is it stated sharks will suffocate if they quit swimming, but I see examples like the white-tipped reef shark who spend the day laying on the bottom?
0
ELI5: Why are steroids more popular in baseball than football or basketball?
0
ELI5: Why does the body make women throw up or get nauseous when pregnant?
16
ELI5: When and why did 8 hours of sleep become the standard for a solid night’s rest?
2
ELI5:How some stars become pulsars?
9 xeddo The key difference is that something that has been encrypted can be decrypted and the exactly same original message can be restored. Encryption is used when you want to make something unreadable but also want to be able to restore the data from this unreadable state. When something is hashed, the created hash is often much smaller and has less information. That means information gets lost and the original message can never be found from the hash. Hashing is used, when you want to make something unreadable that should not be restored from the hash. (Like a password) That way a person/server can check if the hash of your password matches, without knowing your actual password.
2 Blrfl Encryption is the use of a [cipher](https://en.wikipedia.org/wiki/Cipher) to render a stream of data unreadable by anyone who doesn't know how to decipher it. Ciphers don't do anything other than scramble the plain text; the result is exactly the same size so the original can be reconstructed. A hash function is a way to produce a _digest_, or a very short summary of a stream of data. Reddit's [Auto TL;DR bot](https://www.reddit.com/user/autotldr) is a good example of something the produces a digest. If you put the same article into it twice, it will produce the same digest. If you put two different articles into it, even if they're about the same topic, it will, at least in theory, produce two different digests, which would tell you that the two articles aren't the same. (You can see this in the bot's posting history from today, where multiple articles about a comment made by President Trump are digested.) The article digest doesn't represent all of the content of what was digested, which means you can't reconstruct the original article from the digest. Hashes are [cryptographic digests](https://en.wikipedia.org/wiki/Cryptographic_hash_function) that represent a blob of data as a large number. Like article digests, they're not a full representation of the original content and can't be used to reconstitute it. What makes hashing valuable is the fact that a good algorithm will have a low enough collision rate that it would be exceedingly difficult to come up with content that will produce the same hash value. If I give you a password of "mumble" and use the SHA1 algorithm to hash it, you'll store the value b2e80024f443e922aea693ab4ed0027b2c51a2b6 in your password database. When I go to authenticate myself later, if I give you the same password, it will hash out to the same value. If I give you something different, like "bumble," its hash will be 4d7ee105be643583fc8cd836c7104748780b783d, which is very different and means what I gave you isn't the same. This makes hashes great for storing passwords, because even if they're exposed, it's not very practical to come up with a string that produces the same one.
7 0 xeddo The key difference is that something that has been encrypted can be decrypted and the exactly same original message can be restored. Encryption is used when you want to make something unreadable but also want to be able to restore the data from this unreadable state. When something is hashed, the created hash is often much smaller and has less information. That means information gets lost and the original message can never be found from the hash. Hashing is used, when you want to make something unreadable that should not be restored from the hash. (Like a password) That way a person/server can check if the hash of your password matches, without knowing your actual password.
2 0 Blrfl Encryption is the use of a [cipher](https://en.wikipedia.org/wiki/Cipher) to render a stream of data unreadable by anyone who doesn't know how to decipher it. Ciphers don't do anything other than scramble the plain text; the result is exactly the same size so the original can be reconstructed. A hash function is a way to produce a _digest_, or a very short summary of a stream of data. Reddit's [Auto TL;DR bot](https://www.reddit.com/user/autotldr) is a good example of something the produces a digest. If you put the same article into it twice, it will produce the same digest. If you put two different articles into it, even if they're about the same topic, it will, at least in theory, produce two different digests, which would tell you that the two articles aren't the same. (You can see this in the bot's posting history from today, where multiple articles about a comment made by President Trump are digested.) The article digest doesn't represent all of the content of what was digested, which means you can't reconstruct the original article from the digest. Hashes are [cryptographic digests](https://en.wikipedia.org/wiki/Cryptographic_hash_function) that represent a blob of data as a large number. Like article digests, they're not a full representation of the original content and can't be used to reconstitute it. What makes hashing valuable is the fact that a good algorithm will have a low enough collision rate that it would be exceedingly difficult to come up with content that will produce the same hash value. If I give you a password of "mumble" and use the SHA1 algorithm to hash it, you'll store the value b2e80024f443e922aea693ab4ed0027b2c51a2b6 in your password database. When I go to authenticate myself later, if I give you the same password, it will hash out to the same value. If I give you something different, like "bumble," its hash will be 4d7ee105be643583fc8cd836c7104748780b783d, which is very different and means what I gave you isn't the same. This makes hashes great for storing passwords, because even if they're exposed, it's not very practical to come up with a string that produces the same one.