GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
نویسندگان
چکیده
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an increase in computational complexity. This has promoted many researchers to develop high-performance symmetric key cryptography schemes using approaches such as the use of high-end computing hardware. Peer-to-peer (P2P) or enterprise grids are proven as one of the approaches for developing cost-effective high-end computing systems. By utilizing them, one can improve the performance of symmetric key cryptography through parallel execution. This approach makes it attractive for adoption by businesses to secure their documents. In this paper we propose and develop an application for symmetric key cryptography using enterprise grid middleware called Alchemi. An analysis and comparison of its performance is presented along with pointers to future work.
منابع مشابه
IMPROVING THE SECURITY PERFORMANCE IN COMPUTER GRIDS Architecture and Results
Security in computational Grids is mainly based on Grid Security Infrastructure (GSI) for authentication and Virtual Organization Membership Service for authorization. Although these mechanisms provide the required level of security, they lack in performance due to their dependence on public key cryptography. In our proposed security architecture we use a Kerberos-based approach (symmetric cryp...
متن کاملCryptography for a High-Assurance Web-Based Enterprise
Each web service and each infrastructure service has a need for symmetric and asymmetric encryption, as well as signature processing and other cryptographic processes. This profile does not include electrical requirements for MultiLevel Systems (MLS). A number of specialized cryptographic functions have been developed for hardware and network operations. Their use is appropriate for network lev...
متن کاملGridNtru: High Performance PKCS
Cryptographic algorithms play a crucial role in the information society by providing protection from unauthorized access to sensitive data. It is clear that information technology will become increasingly pervasive, Hence we can expect the emergence of ubiquitous or pervasive computing, ambient intelligence. These new environments and applications will present new security challenges, and there...
متن کاملPACMA : An Adaptive Symmetric Cryptographic Algorithm for Parallel Computing Environments
Traditional symmetric cryptographic algorithms are designed considering the cryptographic complexities rather than the processing capacities of the modern computing systems. Hence the performances of these algorithms are inconsistent and vary enormously when implemented in different computing systems with different processing capabilities. Parallelized adaptive cryptographic algorithms that can...
متن کاملMobile Agent Based Key Distribution Approach for Clustered Wireless Sensor Networks
Key management is very crucial need in WSN to protect data and secure communications. One of the Key distribution solutions in WSN is symmetric key cryptography which is relatively faster and energy efficient. However, it cannot bestow high level of security due to difficulty in secure key management. Nevertheless, Asymmetric key cryptography can enhance network security but it also causes ener...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004