z-logo
open-access-imgOpen Access
Comparing the speed of the selected hash and encryption algorithms
Author(s) -
Dawid Górniak,
Piotr Kopniak
Publication year - 2017
Publication title -
journal of computer sciences institute
Language(s) - English
Resource type - Journals
ISSN - 2544-0764
DOI - 10.35784/jcsi.598
Subject(s) - encryption , hash function , computer science , 56 bit encryption , cryptographic hash function , sha 2 , algorithm , probabilistic encryption , secure hash algorithm , signature (topology) , multiple encryption , 40 bit encryption , theoretical computer science , computer security , mathematics , geometry
The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here