Abstract
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an increase in computational complexity. This has promoted many researchers to develop high-performance symmetric key cryptography schemes using approaches such as the use of high-end computing hardware. Peer-to-peer (P2P) or enterprise grids are proven as one of the approaches for developing cost-effective high-end computing systems. By utilizing them, one can improve the performance of symmetric key cryptography through parallel execution. This approach makes it attractive for adoption by businesses to secure their documents. In this paper we propose and develop an application for symmetric key cryptography using enterprise grid middleware called Alchemi. An analysis and comparison of its performance is presented along with pointers to future work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wikipedia. Symmetric key algorithm. Updated March 10, 2004 (June 11, 2004), http://en.wikipedia.org/wiki/Symmetric_key_algorithm
Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice Hall, New Jersey (2003)
Dongara, P., Vijaykumar, T.N.: Accelerating Private-key cryptography via Multithreading on Symmetric Multiprocessors. In: Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) (March 2003)
Burke, J., McDonald, J., Austin, T.: Architectural Support for Fast Symmetric-Key Cryptography. Advanced Computer Architecture Laboratory University of Michigan
MyCrypto.net. Encryption Algorithms (June 11, 2004), http://www.mycrypto.net/encryption/crypto_algorithms.html
Pressel, D.M.: Scalability vs. Performance. U.S. Army Research Laboratory Aberdeen Proving Ground, MD 21005-5066, http://www.hpcmo.hpc.mil/Htdocs/UGC/UGC00/paper/daniel_pressel_scale_paper.pdf
searchSecurity.com. Data Encryption Standard (June 11, 2004), http://searchsecurity.techtarget.com/sDefinition/0,sid14_gci213893,00.html
Schneier, B.: The Blowfish Encryption Algorithm – One Year Later (June 11, 2004), http://www.schneier.com/paper-blowfish-oneyear.html
searchSecurity.com. BlowFish (June 11, 2004), http://searchsecurity.techtarget.com/sDefinition/0,sid14_gci213676,00.html
Jenkins Jr., R.J.: ISAAC and RC4 (June 11, 2004), http://burtleburtle.net/bob/rand/isaac.html
VOCALTechnologies, Ltd. RC4 Encryption Algorithm (June 11, 2004), http://www.vocal.com/RC4.html?glad
Luther, A., Buyya, R., Ranjan, R., Venugopal, S.: A.NET-based Desktop Grid Computing Framework, High Performance Computing: Paradigm and Infrastructure. In: Yang, L., Guo, M. (eds.). Wiley Press, New Jersey (Fall 2004) (in print)
Setiawan, A., Adiutama, D., Liman, J., Luther, A., Buyya, R.: GridCrypt: High Performance Symmetric Key using Enterprise Grids. Technical Report, GRIDS-TR-2004-6, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia (July 7, 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Setiawan, A., Adiutama, D., Liman, J., Luther, A., Buyya, R. (2004). GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_171
Download citation
DOI: https://doi.org/10.1007/978-3-540-30501-9_171
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24013-6
Online ISBN: 978-3-540-30501-9
eBook Packages: Computer ScienceComputer Science (R0)