Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2018

27.03.2018

Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

verfasst von: JunWeon Yoon, TaeYoung Hong, JangWon Choi, ChanYeol Park, KiBong Kim, HeonChang Yu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Over the years, parallel computing models have been proposed to solve large-scale application problems. P2P and cloud computing are well-known distributed computing models and have the advantage of running and implementing the parallel computing. Applying the advantages of both models can enhance the benefits of parallel computing. In this paper, we analyze the efficiency of key search algorithm by combining P2P and cloud computing. For our experiment, we apply the key search algorithm in the field of cryptography. The length of the key, which is stable criterion of cryptographic algorithm, is judged according to the amount of exhaustive key search. And the key space required for the whole investigation is easy to divide and is very appropriate for parallel calculation of P2P environment. In addition, cloud computing can provide the fitting environment to meet the various user requirements using virtualization technology. We conduct the following two performance experiments with P2P and cloud computing. First, we propose the method to guarantee the performance in P2P environment based on virtualization. Next, we simulate the performance of the suggested encryption method in the aforementioned system environment. Results reveal effectiveness and validity of the proposed system environment, which can also provide both scalability and flexibility.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Meng J, Raghunathan A, Chakradhar ST, Byna S (2010) Exploiting the forgiving nature of applications for scalable parallel execution. IPDPS:1–12 Meng J, Raghunathan A, Chakradhar ST, Byna S (2010) Exploiting the forgiving nature of applications for scalable parallel execution. IPDPS:1–12
2.
Zurück zum Zitat Godza G, Cristea V (2002) Comparative study of cow and smp computer configurations. PARELEC:205–210 Godza G, Cristea V (2002) Comparative study of cow and smp computer configurations. PARELEC:205–210
3.
Zurück zum Zitat Shirts M, Pande VS (2000) Screen savers of the world unite!. Science 290(5498):1903–1904CrossRef Shirts M, Pande VS (2000) Screen savers of the world unite!. Science 290(5498):1903–1904CrossRef
4.
Zurück zum Zitat Rho S, Chang H, Kim S, Lee YS (2015) An efficient peer-to-peer and distributed scheduling for cloud and grid computing. Peer-to-Peer Networking and Applications 8(5):863–871CrossRef Rho S, Chang H, Kim S, Lee YS (2015) An efficient peer-to-peer and distributed scheduling for cloud and grid computing. Peer-to-Peer Networking and Applications 8(5):863–871CrossRef
6.
Zurück zum Zitat Crosby M, Nachiappan, Pattanayak P, Verma S, Kalyanaraman V (2015) Blockchain technology: beyond bitcoin. Applied Innovation 2:6–10 Crosby M, Nachiappan, Pattanayak P, Verma S, Kalyanaraman V (2015) Blockchain technology: beyond bitcoin. Applied Innovation 2:6–10
8.
Zurück zum Zitat Ricci L, Iosup A, Prodan R (2016) Large scale distributed cooperative environments on clouds and P2P. Peer-to-Peer Networking and Applications 9(6):1126–1127CrossRef Ricci L, Iosup A, Prodan R (2016) Large scale distributed cooperative environments on clouds and P2P. Peer-to-Peer Networking and Applications 9(6):1126–1127CrossRef
9.
Zurück zum Zitat Ibrahim AS, Hamlyn-Harris J, Grundy J (2016) Emerging security challenges of cloud virtual infrastructure arXiv preprint arXiv:1612.09059 Ibrahim AS, Hamlyn-Harris J, Grundy J (2016) Emerging security challenges of cloud virtual infrastructure arXiv preprint arXiv:1612.09059
10.
Zurück zum Zitat Sheikhalishahi M, Wallace RM, Grandinetti L, Vazquez-Poletti JL, Guerriero F (2016) A multi-dimensional job scheduling. Futur Gener Comput Syst 54:123–131CrossRef Sheikhalishahi M, Wallace RM, Grandinetti L, Vazquez-Poletti JL, Guerriero F (2016) A multi-dimensional job scheduling. Futur Gener Comput Syst 54:123–131CrossRef
11.
Zurück zum Zitat Zhang W et al (2015) RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. SCIENCE CHINA Inf Sci 58(12):1–15 Zhang W et al (2015) RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. SCIENCE CHINA Inf Sci 58(12):1–15
12.
Zurück zum Zitat Jain MM, Mr AA (2014) Implementation of hybrid cryptography algorithm. IJCEM 1(3):126–142 Jain MM, Mr AA (2014) Implementation of hybrid cryptography algorithm. IJCEM 1(3):126–142
14.
Zurück zum Zitat Burnett S, Paine S (2001) RSA Security's official guide to cryptography. McGraw-Hill Burnett S, Paine S (2001) RSA Security's official guide to cryptography. McGraw-Hill
15.
Zurück zum Zitat Stinson DR (2002) CRYPTOGRAPHY theory and practice, 2nd edn. Chapman & Hall/CRC Stinson DR (2002) CRYPTOGRAPHY theory and practice, 2nd edn. Chapman & Hall/CRC
16.
Zurück zum Zitat Mao W (2004) Mordern Crpytography. Prentice Hall Mao W (2004) Mordern Crpytography. Prentice Hall
17.
Zurück zum Zitat Kai H (1993) Advanced computer architecture: parallelism, scalability, programmability. McGraw-Hill Kai H (1993) Advanced computer architecture: parallelism, scalability, programmability. McGraw-Hill
18.
Zurück zum Zitat Caronni G, Robshaw M (1997) How exhausting is exhaustive search? RSA Laboratories CryptoBytes 2(3):1–6 Caronni G, Robshaw M (1997) How exhausting is exhaustive search? RSA Laboratories CryptoBytes 2(3):1–6
19.
Zurück zum Zitat Keller S, Smid M (1998) Modes of Operation Validation System (MOVS): Requirements and Procedures, Gaithersburg, MD 20899, National Institute Standard Technology, NIST-SP-800-17 Keller S, Smid M (1998) Modes of Operation Validation System (MOVS): Requirements and Procedures, Gaithersburg, MD 20899, National Institute Standard Technology, NIST-SP-800-17
21.
Zurück zum Zitat Quisquater JJ, Standaert F (2005) Exhaustive key search of the DES: update and refinements. Special-purpose Hardware for Attacking Cryptographic Systems. Paris, France Quisquater JJ, Standaert F (2005) Exhaustive key search of the DES: update and refinements. Special-purpose Hardware for Attacking Cryptographic Systems. Paris, France
24.
Zurück zum Zitat Yoon JW et al (2015) Stable HPC cluster management scheme through performance evaluation. Computer Science and its Applications. Springer Berlin Heidelberg:1017–1023 Yoon JW et al (2015) Stable HPC cluster management scheme through performance evaluation. Computer Science and its Applications. Springer Berlin Heidelberg:1017–1023
25.
Zurück zum Zitat Sadooghi I, Martin JH, Li T, Brandstatter L, Maheshwari K, de Lacerda Ruivo TP, Garzoglio G, Timm S, Zhao Y, Raicu I (2017) Understanding the performance and potential of cloud computing for scientific applications. IEEE Transactions on Cloud Computing 5(2):358–371CrossRef Sadooghi I, Martin JH, Li T, Brandstatter L, Maheshwari K, de Lacerda Ruivo TP, Garzoglio G, Timm S, Zhao Y, Raicu I (2017) Understanding the performance and potential of cloud computing for scientific applications. IEEE Transactions on Cloud Computing 5(2):358–371CrossRef
26.
Zurück zum Zitat Gropp W, Lusk E, Skjellum A (1999) Using MPI: portable parallel programming with the message-passing interface 1, MIT press Gropp W, Lusk E, Skjellum A (1999) Using MPI: portable parallel programming with the message-passing interface 1, MIT press
27.
Zurück zum Zitat Gropp W, Lusk E, Skjellum A (1999) Using MPI: portable parallel programming with the message-passing interface (2nd edition), Scientific and Engineering Computation Series, MIT Press, Cambridge, MA Gropp W, Lusk E, Skjellum A (1999) Using MPI: portable parallel programming with the message-passing interface (2nd edition), Scientific and Engineering Computation Series, MIT Press, Cambridge, MA
29.
Zurück zum Zitat Dunlop D, Varrette S, Bouvry P (2008) on the use of a genetic algorithm in high performance computer benchmark tuning. Performance evaluation of computer and telecommunication systems, 2008. SPECTS 2008. International Symposium on. IEEE Dunlop D, Varrette S, Bouvry P (2008) on the use of a genetic algorithm in high performance computer benchmark tuning. Performance evaluation of computer and telecommunication systems, 2008. SPECTS 2008. International Symposium on. IEEE
30.
Zurück zum Zitat Tomic D, Gjenero L, Imamagic E (2013) Semidefinite optimization of high performance linpack on is abella cluster. Proceedings of the 35th International Convention MIPRO Tomic D, Gjenero L, Imamagic E (2013) Semidefinite optimization of high performance linpack on is abella cluster. Proceedings of the 35th International Convention MIPRO
31.
Zurück zum Zitat Chen CW, Tsai YR, Wang SJ (2012) Cost-saving key agreement via secret sharing in two-party communication systems. Journal of Convergence 3(4):29–36 Chen CW, Tsai YR, Wang SJ (2012) Cost-saving key agreement via secret sharing in two-party communication systems. Journal of Convergence 3(4):29–36
32.
Zurück zum Zitat Shnha A, Lobiyal DK (2013) Performance evaluation of data aggregation for cluster-based wireless sensor network. Human-Centric Computing and Information Sciences 3(13):1–17 Shnha A, Lobiyal DK (2013) Performance evaluation of data aggregation for cluster-based wireless sensor network. Human-Centric Computing and Information Sciences 3(13):1–17
33.
Zurück zum Zitat Jeong K (2014) Security analysis of block cipher piccolo suitable for wireless sensor networks. Peer-to-Peer Networking and Applications 7(4):636–644CrossRef Jeong K (2014) Security analysis of block cipher piccolo suitable for wireless sensor networks. Peer-to-Peer Networking and Applications 7(4):636–644CrossRef
34.
Zurück zum Zitat Lee S, Kim D, Yi J, Ro WW (2012) An efficient block cipher implementation on many-core graphics processing units. Journal of Information Processing Systems 8(1):159–174CrossRef Lee S, Kim D, Yi J, Ro WW (2012) An efficient block cipher implementation on many-core graphics processing units. Journal of Information Processing Systems 8(1):159–174CrossRef
35.
Zurück zum Zitat Gong Y-J et al (2015) Distributed evolutionary algorithms and their models: a survey of the state-of-the-art. Appl Soft Comput 34:286–300CrossRef Gong Y-J et al (2015) Distributed evolutionary algorithms and their models: a survey of the state-of-the-art. Appl Soft Comput 34:286–300CrossRef
36.
Zurück zum Zitat Celesti A et al (2016) Exploring container virtualization in IoT clouds. Smart Computing (SMARTCOMP), 2016 I.E. International Conference:1–6 Celesti A et al (2016) Exploring container virtualization in IoT clouds. Smart Computing (SMARTCOMP), 2016 I.E. International Conference:1–6
Metadaten
Titel
Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers
verfasst von
JunWeon Yoon
TaeYoung Hong
JangWon Choi
ChanYeol Park
KiBong Kim
HeonChang Yu
Publikationsdatum
27.03.2018
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-018-0641-5

Weitere Artikel der Ausgabe 6/2018

Peer-to-Peer Networking and Applications 6/2018 Zur Ausgabe