Skip to main content
Top
Published in: The Journal of Supercomputing 5/2015

01-05-2015

A parallel algorithm for secure multicast

Authors: J. A. Álvarez-Bermejo, J. M. Arrufat, J. A. López-Ramos

Published in: The Journal of Supercomputing | Issue 5/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this work, we introduce algorithms to speedup and to scale a classical secure multicast protocol that currently goes unused due to its computational and data management requirements when the audience becomes large. This is in spite of its agreeable cryptographic properties, which offers real applicability. A core component of such an algorithm is the well-known method to solve congruent systems, the Chinese remainder algorithm (CRA). This work presents the study, design and implementation of a software approach to the CRA on different parallel architectures. Special attention is placed on big integers, which affect method performance, given that the system is more secure as the modules become larger. This problem leads to the design of a new and more efficient method to address these issues in a scalable way. The results represent an enhancement in efficiency, performance and scalability when compared to existing alternatives.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lin KY, Krishna B, Krishna H (1994) Rings, fields, the Chinese remainder algorithm and an extension—Part I: theory. IEEE Trans Circuits Syst II Analog Digital Signal Process 41(10):641–655 Lin KY, Krishna B, Krishna H (1994) Rings, fields, the Chinese remainder algorithm and an extension—Part I: theory. IEEE Trans Circuits Syst II Analog Digital Signal Process 41(10):641–655
2.
go back to reference Rosen KH (2011) Discrete mathematics and its applications, 7th edn. McGraw-Hill Higher Education. isbn: 978-0077431440 Rosen KH (2011) Discrete mathematics and its applications, 7th edn. McGraw-Hill Higher Education. isbn: 978-0077431440
3.
go back to reference Wang Y (1998) New Chinese remainder algorithms. Conference record of the thirty-second asilomar conference on signals, systems and computers, vol 1. pp 165–171 Wang Y (1998) New Chinese remainder algorithms. Conference record of the thirty-second asilomar conference on signals, systems and computers, vol 1. pp 165–171
4.
go back to reference Toyoshima H, Satoh K, Ariyama K (1996) High-speed hardware algorithms for Chinese remainder theorem. 1996 IEEE International Symposium on circuits and systems, ISCAS 96, connecting the World, vol 2. pp 265–268 Toyoshima H, Satoh K, Ariyama K (1996) High-speed hardware algorithms for Chinese remainder theorem. 1996 IEEE International Symposium on circuits and systems, ISCAS 96, connecting the World, vol 2. pp 265–268
5.
go back to reference Lai YP, Chang CC (2003) Parallel computational algorithms for generalized Chinese remainder theorem. Comput Electr Eng 29:801–811CrossRefMATH Lai YP, Chang CC (2003) Parallel computational algorithms for generalized Chinese remainder theorem. Comput Electr Eng 29:801–811CrossRefMATH
6.
go back to reference Olagunju AO (2008) A computational exploration of the Chinese remainder theorem. J Appl Math Inf 26:307–316 Olagunju AO (2008) A computational exploration of the Chinese remainder theorem. J Appl Math Inf 26:307–316
7.
go back to reference Chang CC, Kuo Y T, Lai YP (2006) Parallel computation of residue number system. International Conference on computing and informatics, ICOCI 2006. pp 1–6 Chang CC, Kuo Y T, Lai YP (2006) Parallel computation of residue number system. International Conference on computing and informatics, ICOCI 2006. pp 1–6
8.
go back to reference Zhu S, Jajodia S (2010) Scalable group key management for secure multicast: A taxonomy and new directions. In: Huang H, MacCallum D, Du D-Z (eds) Network security. Springer, Berlin, pp 57–75 Zhu S, Jajodia S (2010) Scalable group key management for secure multicast: A taxonomy and new directions. In: Huang H, MacCallum D, Du D-Z (eds) Network security. Springer, Berlin, pp 57–75
9.
go back to reference Liu B, Zhang W, Jiang T (2004) A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Consum Electron 50(2):632–637CrossRef Liu B, Zhang W, Jiang T (2004) A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Consum Electron 50(2):632–637CrossRef
10.
go back to reference Chiou G, Chen W (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15(8):929–934CrossRef Chiou G, Chen W (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15(8):929–934CrossRef
11.
go back to reference Kruus S, Macker JP (1998) Techniques and issues in multicast security. In: Proceedings of military communications conference, MILCOM. pp 1028–1032 Kruus S, Macker JP (1998) Techniques and issues in multicast security. In: Proceedings of military communications conference, MILCOM. pp 1028–1032
12.
go back to reference Lin KY, Krishna B, Krishna H (1994) Rings, fields, the Chinese remainder theorem and an extension—Part II: applications to digital signal processing. IEEE Trans Circuits Syst II Analog Digital Signal Process 41:656–668CrossRefMATH Lin KY, Krishna B, Krishna H (1994) Rings, fields, the Chinese remainder theorem and an extension—Part II: applications to digital signal processing. IEEE Trans Circuits Syst II Analog Digital Signal Process 41:656–668CrossRefMATH
13.
go back to reference Li Y, Xiao L, Wang Z, Tian H (2011) High performance point-multiplication for conic curves cryptosystem based on standard NAF algorithm and Chinese remainder theorem. 2011 International Conference on information science and applications (ICISA), pp 1–8 Li Y, Xiao L, Wang Z, Tian H (2011) High performance point-multiplication for conic curves cryptosystem based on standard NAF algorithm and Chinese remainder theorem. 2011 International Conference on information science and applications (ICISA), pp 1–8
15.
go back to reference Antequera N, Lopez-Ramos JA (2011) Remarks and countermeasures on a cryptoanalysis of a secure multicast protocol. In: Proceedings of 7th international conference on next generation web services practices, Salamanca 2011. pp 201–205 Antequera N, Lopez-Ramos JA (2011) Remarks and countermeasures on a cryptoanalysis of a secure multicast protocol. In: Proceedings of 7th international conference on next generation web services practices, Salamanca 2011. pp 201–205
16.
go back to reference Zhu S, Jajodia S (2010) Scalable group key management for securemulticast: a taxonomy and new directions. In: Network security. pp 57–75 Zhu S, Jajodia S (2010) Scalable group key management for securemulticast: a taxonomy and new directions. In: Network security. pp 57–75
17.
go back to reference Chen H (2009) CRT-based high-speed parallel architecture for long BCH encoding. IEEE Trans Circuits Systems II Express Briefs 56(8):684–686CrossRef Chen H (2009) CRT-based high-speed parallel architecture for long BCH encoding. IEEE Trans Circuits Systems II Express Briefs 56(8):684–686CrossRef
18.
go back to reference Toyoshima H, Satoh K, Ariyama K (1996) High-speed hardware algorithms for Chinese remainder theorem. In: 1996 IEEE international symposium on circuits and systems, vol 2. ISCAS ’96, Connecting the World. pp 265–268 Toyoshima H, Satoh K, Ariyama K (1996) High-speed hardware algorithms for Chinese remainder theorem. In: 1996 IEEE international symposium on circuits and systems, vol 2. ISCAS ’96, Connecting the World. pp 265–268
19.
go back to reference Barnat J, Bauch P, Brim L, Ceska M (2010) Employing multiple CUDA devices to accelerate LTL model checking. 2010 IEEE 16th international conference on parallel and distributed systems(ICPADS), pp 259–266 Barnat J, Bauch P, Brim L, Ceska M (2010) Employing multiple CUDA devices to accelerate LTL model checking. 2010 IEEE 16th international conference on parallel and distributed systems(ICPADS), pp 259–266
20.
go back to reference Karunadasa NP (2009) Accelerating high performance applications with CUDA and MPI. In: 2009 International conference on industrial and informations system (ICIIS). pp 331–336 Karunadasa NP (2009) Accelerating high performance applications with CUDA and MPI. In: 2009 International conference on industrial and informations system (ICIIS). pp 331–336
21.
go back to reference Manavski SA (2007) CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: Signal Processing and Communications, ICSPC 2007. pp 65–68 Manavski SA (2007) CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: Signal Processing and Communications, ICSPC 2007. pp 65–68
22.
go back to reference Zhao Y, Huang Z, Chen B, Fang Y, Yan M, Yang Z (2010) Local acceleration in distributed geographic information processing with CUDA. 18th international conference on geoinformatics. pp 1–6 Zhao Y, Huang Z, Chen B, Fang Y, Yan M, Yang Z (2010) Local acceleration in distributed geographic information processing with CUDA. 18th international conference on geoinformatics. pp 1–6
23.
go back to reference Chakrabarti G et al (2012) CUDA: compiling and optimizing for a GPU platform. Procedia Comput 9:1910–1919CrossRef Chakrabarti G et al (2012) CUDA: compiling and optimizing for a GPU platform. Procedia Comput 9:1910–1919CrossRef
Metadata
Title
A parallel algorithm for secure multicast
Authors
J. A. Álvarez-Bermejo
J. M. Arrufat
J. A. López-Ramos
Publication date
01-05-2015
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 5/2015
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-014-1336-1

Other articles of this Issue 5/2015

The Journal of Supercomputing 5/2015 Go to the issue

Premium Partner