摘要 |
<p>The computer-implemented method involves applying the hash function to a freely selectable password (1), where a key string (8) is generated (7) with the generated hash code. The generated key string is used to encrypt the data to be encrypted and to decrypt the data to be encrypted. Multiple strings are generated from the freely selectable password by linking with a salt list (3), where the freely selectable password is linked with a pseudo random salt. An independent claim is included for a computer program for executing the method.</p> |