Comparing the speed of the selected hash and encryption algorithms
Article Sidebar
Open full text
Issue Vol. 4 (2017)
-
Apache Hadoop, platform for the collection, processing and analysis of large data sets
Mateusz Gil70-75
-
Possibilities of using beacons in advertising
Konrad Łyda, Marek Miłosz76-81
-
Comparing the speed of the selected hash and encryption algorithms
Dawid Górniak, Piotr Kopniak82-86
-
Comparison of the security mechanisms of popular operating systems for mobile devices
Michał Buryta, Piotr Kopniak87-91
-
The concept, models and metrics of software quality – an overview
Yuliia Horobets, Marek Miłosz92-98
-
Comparison of fixation and saccades identification algorithms in the eye tracking recordings for medical diagnosis
Marcin Ignatiuk, Przemysław Antoni Pasieczny, Małgorzata Plechawska-Wójcik, Magdalena Borys99-103
-
The analysis of usage possibilities of the Moodle platform to execute the training process in an "Engineering of internal security systems" field of study at Lublin University of Technology
Sławomir Bronisz, Elżbieta Miłosz104-107
-
Personal data protection in terms of provisions of the Polish state and the authority of the General for Personal Data Protection
Damian Harasim108-111
-
Test-Driven Development as a tool to optimize the JEE programming
Grzegorz Sochacki, Beata Pańczyk112-116
-
Comparison of selected graphical web interface libraries used in JEE applications
Piotr Paweł Suwała, Beata Pańczyk117-121
-
Comparative analysis of support systems for interfaces prototyping
Artur Łasocha, Marek Miłosz122-127
-
Comparison Google’s and Yandex’s search algorithms
Oleh Bihun, Marek Miłosz128-130
-
Comparison of features and capabilities of modern Linux file systems ext4, XFS, Btrfs
Bartłomiej Kossak, Maciej Pańczyk131-136
-
The current software tools for the JEE platform
Paweł Ozdoba, Beata Pańczyk137-141
Main Article Content
DOI
Authors
Abstract
The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.
Keywords:
References
[2] Kryptografia i bezpieczeństwo sieci komputerowych, Helion, 2012.
[3] Marcin Karbowski, Podstawy kryptografii RSA. Wydanie III, Helion, 2014.
[4] A. Menezes, Kryptografia stosowana, WTN, 2005.
[5] Serpent, www.pl.wikipedia.org/wiki/Serpent_(kryptografia)
[6] Twofish , www.pl.wikipedia.org/wiki/Twofish.
[7] I. Damgard, A design principle for hash functions, SpringerVerlag, 1990.
[8] MD5, www.pl.wikipedia.org/wiki/MD5
[9] M. Jakobsson, Applied Cryptography and Network Security, Springer Verlag gmbh, 2014.
Article Details
Abstract views: 423
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
