★★ Online security expert based in the United States - feel free to message me to discuss requirements prior to the project being awarded.
☞ How I Can Help You:
There are a few different ways to handle this but I understand the basic requirement - you have data coming in from a network of IoT devices. Said data is encrypted using SHA256 or some other commonly used hash function. You need to decrypt the data for reporting purposes.
Things we should think about are performance, whether we decrypt on the server or the client, whether we store decrypted values or keep them locked down, and how we manage and rotate keys.
☞ About Me:
My name is Tom Griffin, I'm based in the United States, and I have fifteen years of experience in a variety of technology and business roles. You may read more about me on LinkedIn if you search for "Tom Griffin IEEE."
☞ Warranty:
All of my work comes with a 30-day warranty in the event something fails to work or experiences issues.
║✭✭✭✭✭✭✭▅▅▅▅▅▅▅▅▅ Tom is based in the United States
║✭✭✭✭✭✭✭▅▅▅▅▅▅▅▅▅ and has worked with major organizations.
║✭✭✭✭✭✭✭▅▅▅▅▅▅▅▅▅ You can read more about him in his profile
║▅▅▅▅▅▅▅▅▅▅▅▅▅▅▅ or by finding him on LinkedIn by searching for
║▅▅▅▅▅▅▅▅▅▅▅▅▅▅▅ "Tom Griffin IEEE."
║▅▅▅▅▅▅▅▅▅▅▅▅▅▅▅