Tuesday, December 31, 2019

Parallel Computing Of Cryptography A Literature Review

PARALLEL COMPUTING IN CRYPTOGRAPHY A Literature Review Presented to Sharmin Khan Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Class CS 200W By Rachel Gonsalves May 2016 Abstract In today’s world a lot of data is being exchanged via the internet. Sensitive data such as official documents, bank details, credit card information, as well as personal information is being sent online. To maintain the confidentiality, integrity and availability of this data, it needs to be encrypted. Cryptology deals with cryptography and cryptanalysis, i.e., encryption and decryption of information. To keep the data safe from intruders, various cryptographic algorithms are implemented. Parallel processing enhances the speed of these systems and makes it more efficient. Parallel computation can be performed using multicore processors by parallelizing the execution of algorithms in multiple cores. The main area of focus will be the parallelization of Advanced Encryption Standard (AES) algorithm, which is widely in use today. The paper reviews the implementation of AES algorithm on multiple cores and the speedups observed in the process. TABLE OF CONTENTS 1. Introduction 4 2. Cryptography 5 3. Advanced Encryption Standard 5 4. Message Passing Interface 6 5. Parallel Processing System 8 6. Results and Performance 9 6.1. Encryption 9 6.2. Decryption 11 7. Conclusion 13 References 13Show MoreRelatedAnnotated Bibliography On Information Security2492 Words   |  10 PagesAbstract Information security is a major concept in today’s industrial and computer era, so security must be higher to protect the confidential data. Information security plays major role in computer and network security with the use of different cryptography algorithms that includes the encryption and decryption of data with the uses of the algorithm and the key. By means of text or numerical key for the encryption can be dangerous because with the several hack attacks that a key can be broken. SoRead MoreNotes On N + N1392 Words   |  6 Pagesdiscarded; and then iterated again to initialize w0, w1, w2, w3, A0, B0, C0, D0, K0, K1, K2, K3, n0, n1, n2, n3. In order for equation (7) to provide randomness and reproducibility of same initial conditions each time it is run even on different computing machine, it should be ensured that values like Key, ÃŽ » set at 2.59, and initial iteration of 50 to discard values are used with same precision arithmetic. Further test analysis for robustne ss of sequences is discussed in performance analysis sectionRead MorePerformance Of Network Routing1683 Words   |  7 Pages 2.1 LITERATURE SURVEY This section has represents the over read of connected paper support the present analysis. These papers do not seem to be utterly associated with project approach however positively enhance the performance of network routing protocol. During this existing approach [26]† K. Vanaja and Dr. R. Umarani,† Associate in Nursing implementation of OSPF routing protocol with multi-metrics was conferred. During this implementation OSPF -UU (Uppsala University) Routing protocol is changedRead MoreDesigning Secure Protocol For Wireless Ad Hoc Networks3354 Words   |  14 PagesFaculty of Computing, Engineering and Science DESIGNING SECURE PROTOCOL FOR WIRELESS AD-HOC NETWORKS STUDENT NAME : ARVINDH KUMAR S T REFERENCE NO : 14024765 AWARD : COMPUTER NETWORKS AND SECURITY MODULE CODE : C0CS70686-2014-SPG1-2014-SPG1 MODULE TITLE : RESEARCH METHODS FOR NETWORKING LECTURER : RACHEL CORNES SUBMISSION DATE: 05-DEC-2014 TABLE OF CONTENTS: 1 BACKGROUND 2 PROPOSED WORKRead MoreDraft Cloud Computing Synopsis and Recommendations33529 Words   |  135 PagesSpecial Publication 800-146 DRAFT Cloud Computing Synopsis and Recommendations Recommendations of the National Institute of Standards and Technology Lee Badger Tim Grance Robert Patt-Corner Jeff Voas NIST Special Publication 800-146 DRAFT Cloud Computing Synopsis and Recommendations Recommendations of the National Institute of Standards and Technology Lee Badger Tim Grance Robert Patt-Corner Jeff Voas C O M P U T E R S E C U R I T Y Computer Security Division Information TechnologyRead MoreChapter 1 Systems Analysis and Design Thesis (Resort)7416 Words   |  30 PagesCHAPTER 1 THE PROBLEM AND THE REVIEW OF RELATED LITERATURE INTRODUCTION A resort is like a small community composed of buildings and facilities located in a scenic area that provides lodging, entertainment, and a relaxing environment for people on vacation. Basic accommodations offered by resorts nowadays are swimming pools, cottage and room rentals, and restaurants. The resort business is becoming popular nowadays due to the growing demand of people for a convenient one-stop-place of leisure andRead MoreIpv6 Transition18083 Words   |  73 Pages- 1.6 Overview of IPv4 - 13 - 1.7 IPv4 Limitations - 14 - 1.8 Internet Protocol Next Generation (IPng) and IPv6 - 14 - 1.9 Features of IPv6 - 15 - 1.10 Difference between IPv4 and IPv6 at a glance - 17 - Chapter 2: Literature Review - 18 - 2.1 Principle Concepts - 18 - 2.2 IPv6 Benefits and Features - 19 - 2.3 IPv6 Addressing - 22 - 2.4 Mobile IPv6 - 22 - 2.5 IPSec - 23 - 2.6 Transition Methodologies - 23 - 2.7 Internet Administration -

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.