Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …
159
Fig. 12 The Decryption process and create a verify
Fig. 13 The Encryption process with creating a Blockchain and using RSA and AES
up of only eight characters “uppercase and lowercase letters and numbers only”,
where were used 100 passwords, is shown in Figs. 17 and 18.
The implementation time range is between 0.4 s and 0.8 s depending on the
experiment, while this time would be much greater if the iteration count was more,
in addition to another effect which is Increasing the length of the password and
forming it from all keyboard characters, all of this will lead to a significant increase
in performance time and the capacity of memory. As we know that one of the most
important uses of PBKDF2 is to resist brute force attacks that can occur when the keys