Comparing the speed of the selected hash and encryption algorithms
The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library fo...
Main Authors: | Dawid Górniak, Piotr Kopniak |
---|---|
Format: | Article |
Language: | English |
Published: |
Lublin University of Technology
2017-09-01
|
Series: | Journal of Computer Sciences Institute |
Subjects: | |
Online Access: | https://ph.pollub.pl/index.php/jcsi/article/view/598 |
Similar Items
-
An algorithm for securing user credentials by combining Encryption and Hashing method
by: Awlad Hossain, et al.
Published: (2020-12-01) -
Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption
by: Rafael Álvarez, et al.
Published: (2018-12-01) -
A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption
by: Aswin Wibisurya, et al.
Published: (2014-12-01) -
SOFTWARE, ALGORITHMS AND METHODS OF DATA ENCRYPTION BASED ON NATIONAL STANDARDS
by: Mirkhon Nurullaev, et al.
Published: (2020-01-01) -
Image Encryption Based on Hash Table Scrambling and DNA Substitution
by: Xingyuan Wang, et al.
Published: (2020-01-01)