GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids

نویسندگان

  • Agus Setiawan
  • David Adiutama
  • Julius Liman
  • Akshay Luther
  • Rajkumar Buyya
چکیده

Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an increase in computational complexity. This has promoted many researchers to develop high-performance symmetric key cryptography schemes using approaches such as the use of high-end computing hardware. Peer-to-peer (P2P) or enterprise grids are proven as one of the approaches for developing cost-effective high-end computing systems. By utilizing them, one can improve the performance of symmetric key cryptography through parallel execution. This approach makes it attractive for adoption by businesses to secure their documents. In this paper we propose and develop an application for symmetric key cryptography using enterprise grid middleware called Alchemi. An analysis and comparison of its performance is presented along with pointers to future work.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMPROVING THE SECURITY PERFORMANCE IN COMPUTER GRIDS Architecture and Results

Security in computational Grids is mainly based on Grid Security Infrastructure (GSI) for authentication and Virtual Organization Membership Service for authorization. Although these mechanisms provide the required level of security, they lack in performance due to their dependence on public key cryptography. In our proposed security architecture we use a Kerberos-based approach (symmetric cryp...

متن کامل

Cryptography for a High-Assurance Web-Based Enterprise

Each web service and each infrastructure service has a need for symmetric and asymmetric encryption, as well as signature processing and other cryptographic processes. This profile does not include electrical requirements for MultiLevel Systems (MLS). A number of specialized cryptographic functions have been developed for hardware and network operations. Their use is appropriate for network lev...

متن کامل

GridNtru: High Performance PKCS

Cryptographic algorithms play a crucial role in the information society by providing protection from unauthorized access to sensitive data. It is clear that information technology will become increasingly pervasive, Hence we can expect the emergence of ubiquitous or pervasive computing, ambient intelligence. These new environments and applications will present new security challenges, and there...

متن کامل

PACMA : An Adaptive Symmetric Cryptographic Algorithm for Parallel Computing Environments

Traditional symmetric cryptographic algorithms are designed considering the cryptographic complexities rather than the processing capacities of the modern computing systems. Hence the performances of these algorithms are inconsistent and vary enormously when implemented in different computing systems with different processing capabilities. Parallelized adaptive cryptographic algorithms that can...

متن کامل

Mobile Agent Based Key Distribution Approach for Clustered Wireless Sensor Networks

Key management is very crucial need in WSN to protect data and secure communications. One of the Key distribution solutions in WSN is symmetric key cryptography which is relatively faster and energy efficient. However, it cannot bestow high level of security due to difficulty in secure key management. Nevertheless, Asymmetric key cryptography can enhance network security but it also causes ener...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004