Comparing the speed of the selected hash and encryption algorithms

The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library fo...

Full description

Bibliographic Details
Main Authors: Dawid Górniak, Piotr Kopniak
Format: Article
Language:English
Published: Lublin University of Technology 2017-09-01
Series:Journal of Computer Sciences Institute
Subjects:
Online Access:https://ph.pollub.pl/index.php/jcsi/article/view/598
id doaj-dd480ae59c9345e5a7e4df4d92b6d852
record_format Article
spelling doaj-dd480ae59c9345e5a7e4df4d92b6d8522020-11-25T04:05:10ZengLublin University of TechnologyJournal of Computer Sciences Institute2544-07642017-09-01410.35784/jcsi.598Comparing the speed of the selected hash and encryption algorithmsDawid Górniak0Piotr Kopniak1Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, PolandInstitute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1. https://ph.pollub.pl/index.php/jcsi/article/view/598encryption algorithms; hash functions; Bouncy Castle
collection DOAJ
language English
format Article
sources DOAJ
author Dawid Górniak
Piotr Kopniak
spellingShingle Dawid Górniak
Piotr Kopniak
Comparing the speed of the selected hash and encryption algorithms
Journal of Computer Sciences Institute
encryption algorithms; hash functions; Bouncy Castle
author_facet Dawid Górniak
Piotr Kopniak
author_sort Dawid Górniak
title Comparing the speed of the selected hash and encryption algorithms
title_short Comparing the speed of the selected hash and encryption algorithms
title_full Comparing the speed of the selected hash and encryption algorithms
title_fullStr Comparing the speed of the selected hash and encryption algorithms
title_full_unstemmed Comparing the speed of the selected hash and encryption algorithms
title_sort comparing the speed of the selected hash and encryption algorithms
publisher Lublin University of Technology
series Journal of Computer Sciences Institute
issn 2544-0764
publishDate 2017-09-01
description The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.
topic encryption algorithms; hash functions; Bouncy Castle
url https://ph.pollub.pl/index.php/jcsi/article/view/598
work_keys_str_mv AT dawidgorniak comparingthespeedoftheselectedhashandencryptionalgorithms
AT piotrkopniak comparingthespeedoftheselectedhashandencryptionalgorithms
_version_ 1724435191943921664