Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2018

27-03-2018

Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

Published in: Peer-to-Peer Networking and Applications | Issue 6/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Over the years, parallel computing models have been proposed to solve large-scale application problems. P2P and cloud computing are well-known distributed computing models and have the advantage of running and implementing the parallel computing. Applying the advantages of both models can enhance the benefits of parallel computing. In this paper, we analyze the efficiency of key search algorithm by combining P2P and cloud computing. For our experiment, we apply the key search algorithm in the field of cryptography. The length of the key, which is stable criterion of cryptographic algorithm, is judged according to the amount of exhaustive key search. And the key space required for the whole investigation is easy to divide and is very appropriate for parallel calculation of P2P environment. In addition, cloud computing can provide the fitting environment to meet the various user requirements using virtualization technology. We conduct the following two performance experiments with P2P and cloud computing. First, we propose the method to guarantee the performance in P2P environment based on virtualization. Next, we simulate the performance of the suggested encryption method in the aforementioned system environment. Results reveal effectiveness and validity of the proposed system environment, which can also provide both scalability and flexibility.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Meng J, Raghunathan A, Chakradhar ST, Byna S (2010) Exploiting the forgiving nature of applications for scalable parallel execution. IPDPS:1–12 Meng J, Raghunathan A, Chakradhar ST, Byna S (2010) Exploiting the forgiving nature of applications for scalable parallel execution. IPDPS:1–12
2.
go back to reference Godza G, Cristea V (2002) Comparative study of cow and smp computer configurations. PARELEC:205–210 Godza G, Cristea V (2002) Comparative study of cow and smp computer configurations. PARELEC:205–210
3.
go back to reference Shirts M, Pande VS (2000) Screen savers of the world unite!. Science 290(5498):1903–1904CrossRef Shirts M, Pande VS (2000) Screen savers of the world unite!. Science 290(5498):1903–1904CrossRef
4.
go back to reference Rho S, Chang H, Kim S, Lee YS (2015) An efficient peer-to-peer and distributed scheduling for cloud and grid computing. Peer-to-Peer Networking and Applications 8(5):863–871CrossRef Rho S, Chang H, Kim S, Lee YS (2015) An efficient peer-to-peer and distributed scheduling for cloud and grid computing. Peer-to-Peer Networking and Applications 8(5):863–871CrossRef
6.
go back to reference Crosby M, Nachiappan, Pattanayak P, Verma S, Kalyanaraman V (2015) Blockchain technology: beyond bitcoin. Applied Innovation 2:6–10 Crosby M, Nachiappan, Pattanayak P, Verma S, Kalyanaraman V (2015) Blockchain technology: beyond bitcoin. Applied Innovation 2:6–10
8.
go back to reference Ricci L, Iosup A, Prodan R (2016) Large scale distributed cooperative environments on clouds and P2P. Peer-to-Peer Networking and Applications 9(6):1126–1127CrossRef Ricci L, Iosup A, Prodan R (2016) Large scale distributed cooperative environments on clouds and P2P. Peer-to-Peer Networking and Applications 9(6):1126–1127CrossRef
9.
go back to reference Ibrahim AS, Hamlyn-Harris J, Grundy J (2016) Emerging security challenges of cloud virtual infrastructure arXiv preprint arXiv:1612.09059 Ibrahim AS, Hamlyn-Harris J, Grundy J (2016) Emerging security challenges of cloud virtual infrastructure arXiv preprint arXiv:1612.09059
10.
go back to reference Sheikhalishahi M, Wallace RM, Grandinetti L, Vazquez-Poletti JL, Guerriero F (2016) A multi-dimensional job scheduling. Futur Gener Comput Syst 54:123–131CrossRef Sheikhalishahi M, Wallace RM, Grandinetti L, Vazquez-Poletti JL, Guerriero F (2016) A multi-dimensional job scheduling. Futur Gener Comput Syst 54:123–131CrossRef
11.
go back to reference Zhang W et al (2015) RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. SCIENCE CHINA Inf Sci 58(12):1–15 Zhang W et al (2015) RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. SCIENCE CHINA Inf Sci 58(12):1–15
12.
go back to reference Jain MM, Mr AA (2014) Implementation of hybrid cryptography algorithm. IJCEM 1(3):126–142 Jain MM, Mr AA (2014) Implementation of hybrid cryptography algorithm. IJCEM 1(3):126–142
14.
go back to reference Burnett S, Paine S (2001) RSA Security's official guide to cryptography. McGraw-Hill Burnett S, Paine S (2001) RSA Security's official guide to cryptography. McGraw-Hill
15.
go back to reference Stinson DR (2002) CRYPTOGRAPHY theory and practice, 2nd edn. Chapman & Hall/CRC Stinson DR (2002) CRYPTOGRAPHY theory and practice, 2nd edn. Chapman & Hall/CRC
16.
go back to reference Mao W (2004) Mordern Crpytography. Prentice Hall Mao W (2004) Mordern Crpytography. Prentice Hall
17.
go back to reference Kai H (1993) Advanced computer architecture: parallelism, scalability, programmability. McGraw-Hill Kai H (1993) Advanced computer architecture: parallelism, scalability, programmability. McGraw-Hill
18.
go back to reference Caronni G, Robshaw M (1997) How exhausting is exhaustive search? RSA Laboratories CryptoBytes 2(3):1–6 Caronni G, Robshaw M (1997) How exhausting is exhaustive search? RSA Laboratories CryptoBytes 2(3):1–6
19.
go back to reference Keller S, Smid M (1998) Modes of Operation Validation System (MOVS): Requirements and Procedures, Gaithersburg, MD 20899, National Institute Standard Technology, NIST-SP-800-17 Keller S, Smid M (1998) Modes of Operation Validation System (MOVS): Requirements and Procedures, Gaithersburg, MD 20899, National Institute Standard Technology, NIST-SP-800-17
21.
go back to reference Quisquater JJ, Standaert F (2005) Exhaustive key search of the DES: update and refinements. Special-purpose Hardware for Attacking Cryptographic Systems. Paris, France Quisquater JJ, Standaert F (2005) Exhaustive key search of the DES: update and refinements. Special-purpose Hardware for Attacking Cryptographic Systems. Paris, France
24.
go back to reference Yoon JW et al (2015) Stable HPC cluster management scheme through performance evaluation. Computer Science and its Applications. Springer Berlin Heidelberg:1017–1023 Yoon JW et al (2015) Stable HPC cluster management scheme through performance evaluation. Computer Science and its Applications. Springer Berlin Heidelberg:1017–1023
25.
go back to reference Sadooghi I, Martin JH, Li T, Brandstatter L, Maheshwari K, de Lacerda Ruivo TP, Garzoglio G, Timm S, Zhao Y, Raicu I (2017) Understanding the performance and potential of cloud computing for scientific applications. IEEE Transactions on Cloud Computing 5(2):358–371CrossRef Sadooghi I, Martin JH, Li T, Brandstatter L, Maheshwari K, de Lacerda Ruivo TP, Garzoglio G, Timm S, Zhao Y, Raicu I (2017) Understanding the performance and potential of cloud computing for scientific applications. IEEE Transactions on Cloud Computing 5(2):358–371CrossRef
26.
go back to reference Gropp W, Lusk E, Skjellum A (1999) Using MPI: portable parallel programming with the message-passing interface 1, MIT press Gropp W, Lusk E, Skjellum A (1999) Using MPI: portable parallel programming with the message-passing interface 1, MIT press
27.
go back to reference Gropp W, Lusk E, Skjellum A (1999) Using MPI: portable parallel programming with the message-passing interface (2nd edition), Scientific and Engineering Computation Series, MIT Press, Cambridge, MA Gropp W, Lusk E, Skjellum A (1999) Using MPI: portable parallel programming with the message-passing interface (2nd edition), Scientific and Engineering Computation Series, MIT Press, Cambridge, MA
29.
go back to reference Dunlop D, Varrette S, Bouvry P (2008) on the use of a genetic algorithm in high performance computer benchmark tuning. Performance evaluation of computer and telecommunication systems, 2008. SPECTS 2008. International Symposium on. IEEE Dunlop D, Varrette S, Bouvry P (2008) on the use of a genetic algorithm in high performance computer benchmark tuning. Performance evaluation of computer and telecommunication systems, 2008. SPECTS 2008. International Symposium on. IEEE
30.
go back to reference Tomic D, Gjenero L, Imamagic E (2013) Semidefinite optimization of high performance linpack on is abella cluster. Proceedings of the 35th International Convention MIPRO Tomic D, Gjenero L, Imamagic E (2013) Semidefinite optimization of high performance linpack on is abella cluster. Proceedings of the 35th International Convention MIPRO
31.
go back to reference Chen CW, Tsai YR, Wang SJ (2012) Cost-saving key agreement via secret sharing in two-party communication systems. Journal of Convergence 3(4):29–36 Chen CW, Tsai YR, Wang SJ (2012) Cost-saving key agreement via secret sharing in two-party communication systems. Journal of Convergence 3(4):29–36
32.
go back to reference Shnha A, Lobiyal DK (2013) Performance evaluation of data aggregation for cluster-based wireless sensor network. Human-Centric Computing and Information Sciences 3(13):1–17 Shnha A, Lobiyal DK (2013) Performance evaluation of data aggregation for cluster-based wireless sensor network. Human-Centric Computing and Information Sciences 3(13):1–17
33.
go back to reference Jeong K (2014) Security analysis of block cipher piccolo suitable for wireless sensor networks. Peer-to-Peer Networking and Applications 7(4):636–644CrossRef Jeong K (2014) Security analysis of block cipher piccolo suitable for wireless sensor networks. Peer-to-Peer Networking and Applications 7(4):636–644CrossRef
34.
go back to reference Lee S, Kim D, Yi J, Ro WW (2012) An efficient block cipher implementation on many-core graphics processing units. Journal of Information Processing Systems 8(1):159–174CrossRef Lee S, Kim D, Yi J, Ro WW (2012) An efficient block cipher implementation on many-core graphics processing units. Journal of Information Processing Systems 8(1):159–174CrossRef
35.
go back to reference Gong Y-J et al (2015) Distributed evolutionary algorithms and their models: a survey of the state-of-the-art. Appl Soft Comput 34:286–300CrossRef Gong Y-J et al (2015) Distributed evolutionary algorithms and their models: a survey of the state-of-the-art. Appl Soft Comput 34:286–300CrossRef
36.
go back to reference Celesti A et al (2016) Exploring container virtualization in IoT clouds. Smart Computing (SMARTCOMP), 2016 I.E. International Conference:1–6 Celesti A et al (2016) Exploring container virtualization in IoT clouds. Smart Computing (SMARTCOMP), 2016 I.E. International Conference:1–6
Metadata
Title
Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers
Publication date
27-03-2018
Published in
Peer-to-Peer Networking and Applications / Issue 6/2018
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-018-0641-5

Other articles of this Issue 6/2018

Peer-to-Peer Networking and Applications 6/2018 Go to the issue

Premium Partner