Text this: Analysis and comparison of encryption and verification algorithms applied to a Fog Computing Architecture