Comparing the speed of the selected hash and encryption algorithms
The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library fo...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Lublin University of Technology
2017-09-01
|
Series: | Journal of Computer Sciences Institute |
Subjects: | |
Online Access: | https://ph.pollub.pl/index.php/jcsi/article/view/598 |
id |
doaj-dd480ae59c9345e5a7e4df4d92b6d852 |
---|---|
record_format |
Article |
spelling |
doaj-dd480ae59c9345e5a7e4df4d92b6d8522020-11-25T04:05:10ZengLublin University of TechnologyJournal of Computer Sciences Institute2544-07642017-09-01410.35784/jcsi.598Comparing the speed of the selected hash and encryption algorithmsDawid Górniak0Piotr Kopniak1Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, PolandInstitute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1. https://ph.pollub.pl/index.php/jcsi/article/view/598encryption algorithms; hash functions; Bouncy Castle |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Dawid Górniak Piotr Kopniak |
spellingShingle |
Dawid Górniak Piotr Kopniak Comparing the speed of the selected hash and encryption algorithms Journal of Computer Sciences Institute encryption algorithms; hash functions; Bouncy Castle |
author_facet |
Dawid Górniak Piotr Kopniak |
author_sort |
Dawid Górniak |
title |
Comparing the speed of the selected hash and encryption algorithms |
title_short |
Comparing the speed of the selected hash and encryption algorithms |
title_full |
Comparing the speed of the selected hash and encryption algorithms |
title_fullStr |
Comparing the speed of the selected hash and encryption algorithms |
title_full_unstemmed |
Comparing the speed of the selected hash and encryption algorithms |
title_sort |
comparing the speed of the selected hash and encryption algorithms |
publisher |
Lublin University of Technology |
series |
Journal of Computer Sciences Institute |
issn |
2544-0764 |
publishDate |
2017-09-01 |
description |
The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.
|
topic |
encryption algorithms; hash functions; Bouncy Castle |
url |
https://ph.pollub.pl/index.php/jcsi/article/view/598 |
work_keys_str_mv |
AT dawidgorniak comparingthespeedoftheselectedhashandencryptionalgorithms AT piotrkopniak comparingthespeedoftheselectedhashandencryptionalgorithms |
_version_ |
1724435191943921664 |