{"version":"1.0","provider_name":"IRI","provider_url":"https:\/\/beta.iri.com\/blog","author_name":"Andrew Allen","author_url":"https:\/\/beta.iri.com\/blog\/author\/andrewa\/","title":"Hashing and Encryption: A Likely Pair - IRI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"QS8We8EeK6\"><a href=\"https:\/\/beta.iri.com\/blog\/data-protection\/hashing-tables-encryption\/\">Hashing and Encryption: A Likely Pair<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/beta.iri.com\/blog\/data-protection\/hashing-tables-encryption\/embed\/#?secret=QS8We8EeK6\" width=\"600\" height=\"338\" title=\"&#8220;Hashing and Encryption: A Likely Pair&#8221; &#8212; IRI\" data-secret=\"QS8We8EeK6\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2013\/02\/Hashing-Image.jpg","thumbnail_width":398,"thumbnail_height":506,"description":"Hashing and encryption are distinct disciplines, but due to their nature they find harmony in cryptography. This article describes hashing, its synergy with encryption, and uses in\u00a0IRI FieldShield\u00a0for enhancing data protection. What is Hashing? Hashing turns variable input data (known as the &#8220;message&#8221; or &#8220;pre-image&#8221; &#8230; for example, a password) into fixed length, obscure alphanumericRead More"}