RESEARCH OF ACTUAL CODING OLGORITHMS FOR PROTECTION OF PERSONAL DATA
Journal: International Scientific Journal "Internauka" (Vol.1, No. 53)Publication Date: 2018-07-15
Authors : Hroza Petro; Kimachuk Tetiana;
Page : 41-44
Keywords : cryptomemetic; protection of personal data; algorithm; encoding; hash function; encryption; security;
Abstract
The basic, kryptoperidinium regarding the mechanisms of protection of personal information. The analysis of the mechanisms for the protection of personal data with obligatory comparison of them. The main difference between block ciphers and stream marked features of hash functions. Describes mechanisms used to implement the hash function SHA-256, it is determined that the SHA-256 algorithm is more stable and provides a sufficient degree of protection of any important information.
Other Latest Articles
- THE SMART HOUSE SYSTEM BASED ON ESP MODULE AND TELEGRAM MESSENGER
- BLUEBORNE VULNERABILITIES IN BLUETOOTH IMPLEMENTATIONS IN DIFFERENT OPERATION SYSTEMS
- WIRELESS ACCESS POINTS VULNERABILITIES AND PROTECTION METHODS FOR THEM
- HISTORY OF TELEVISION DEVELOPMENT IN THE CONTEXT OF COMMUNICATION FEATURES OF THE OFF-LINE MODEL
- PHENOMENON OF COLLECTING IN THE CONTEXT OF VISUAL CULTURE
Last modified: 2018-08-08 01:49:32