Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …

159

Fig. 12 The Decryption process and create a verify

Fig. 13 The Encryption process with creating a Blockchain and using RSA and AES

up of only eight characters “uppercase and lowercase letters and numbers only”,

where were used 100 passwords, is shown in Figs. 17 and 18.

The implementation time range is between 0.4 s and 0.8 s depending on the

experiment, while this time would be much greater if the iteration count was more,

in addition to another effect which is Increasing the length of the password and

forming it from all keyboard characters, all of this will lead to a significant increase

in performance time and the capacity of memory. As we know that one of the most

important uses of PBKDF2 is to resist brute force attacks that can occur when the keys