Hashing algorithms – a way to secure your application

Wiktor A Fryze, Ireneusz J Jóźwiak, Andrzej M Kałuża

Abstract


This article presents one of the mechanisms of ensuring security in applications designed in Java programming language – hashing algorithms. It describes selected elements of Java Cryptographic Architecture library. Chosen algorithms were scrutinized in terms of the security and how fast they work.

Keywords


algorithm; hashing; java; security

Full Text:

PDF

References


Bauer F. L.: Sekrety kryptografii. Helion, Gliwice 2002.

Ferguson N., Schneier B.: Kryptografia w praktyce. Helion, Gliwice 2004.

Hook D.: Kryptografia w Javie: od podstaw. Helion, Gliwice 2006.

Horstmann CS., Cornell G.: Core Java 2. Wydanie 2 - Techniki zaawansowane. Rozdział 9, Helion, Gliwice 2005.

Oaks S.: Java a bezpieczeństwo. Wydawnictwo RM, Warszawa 2002.

Richardson W. C, Avondolio D., Vitale J., Schrager S.,Mitchell M.W., Scanlon J.: Professional Java JDK 5 Edition. Wrox, Indianapolis 2005.

Schwaha P., Heinzl R.: Zagrożenia związane ze stosowaniem algorytmu MD5. hakin9 Magazine 1/2005, Wydawnictwo Software, Warszawa 2005.

Wang X., Yin Y. L., Yu H.: Collision Search Attacks on SHA1. 2005.




DOI: http://dx.doi.org/10.21936/si2008_v29.n4B.509