Encryption Algorithms
Description of the encryption algorithms
Encryption algorithm (or more precisely cryptographic algorithm) is a method for converting sensitive information (so called plain text) to the encrypted form which is unreadable for human. By design, the only way to read the encrypted data is decryption with a corresponding algorithm which converts data back to the plain text.
Nowadays computers use sophisticated encryption algorithms, which require the encryption key. The encryption key defines the behavior of algorithm so in fact it is a short configuration data. With this solution a cryptographic algorithm may actually behave in many different ways depending on the key data. The encryption key is generated from the password provided by user.
LoginCode encrypts and decrypts your database using algorithms supplied by the operating system so it allows you to use newest and strongest encryption algorithms available in the world! According to the accepted standards there are two algorithms pre-selected for the entire database while its creation:
Both hashing and encryption algorithms are listed in descending order of sophistication degree. Therefore, SHA-512 and AES-256 are most secure algorithms and they are selected by default when LoginCode creates your database.
|
You can learn more about LoginCode on the following websites: