Skip to main content

Parallelization Method of Encryption Algorithms

  • Conference paper
Advances in Information Processing and Protection

Abstract

An automatic parallelization method of cryptographic algorithms such as DES, Triple DES, IDEA, AES, RC5, Blowfish, LOKI91, GOST, RSA,and data encryption standard modes of operation: CTR, CBC, CFB is presented.The method is based on the data dependency analysis of loops and well-known loop parallelization techniques. The OpenMP standard was chosen for representing the parallelism of algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, John Wiley & Sons, 2 edition, 1995

    Google Scholar 

  2. Menezes, A.J, van Oorschot, P.C., Vanstone, S.A., Handbook of Applied Cryptography, CRC Press, 1996

    Google Scholar 

  3. Bielecki, W., Burak, D., Exploiting Loop-Level Parallelism in the AES Algorithm, WSEAS Transactions on Computers, Issue 1, Volume 5, January 2006

    Google Scholar 

  4. Beletskyy, V., Burak, D., Parallelization of the Data Encryption Standard (DES) Algorithm, Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, pp.23-33, Kluwer Academic Publishers 2005

    Google Scholar 

  5. Beletskyy, V., Burak, D., Parallelization of the IDEA Algorithm, Lecture Notes in Computer Science, Computational Science- ICCS 2004: 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part I, pp.635-638, Springer-Verlag Heidelberg 2004

    Google Scholar 

  6. Bielecki, W., Burak, D., Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers, Image Analysis, Computer Graphics, Security Systems and Artificial Intelligence Applications Vol.I (ACS-CISIM 2005), Białystok 2005

    Google Scholar 

  7. Bielecki, W., Burak, D., Parallelization of Symmetric Block Ciphers, Computing, Multimedia and Intelligent Techniques special issue on Live Biometrics and Security, Volume 1 (2005) No.1 Published June 2005, Czestochowa University of Technology

    Google Scholar 

  8. Burak, D., Automatyczne zrównoleglenie algorytmu Triple DES, Materiały VIII Sesji Naukowej Informatyki PS, Szczecin 2003 (in polish)

    Google Scholar 

  9. Allen, R., Kennedy, K., Optimizing compilers for modern architectures: A Dependence- based Approach, Morgan Kaufmann Publishers, Inc., 2001

    Google Scholar 

  10. Moldovan, D.I., Parallel Processing. From Applications to Systems, Morgan Kaufmann Publishers, Inc., 1993

    Google Scholar 

  11. OpenMP Application Program Interface, Version 2.5, May 2005

    Google Scholar 

  12. Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D., New User Interface for Petit and Other Extensions. User Guide. 1996

    Google Scholar 

  13. http://mirrors.isc.org/pub/DragonFly/dragonfly-current/src/secure/lib/libcrypt/blowfish.c

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this paper

Cite this paper

Bielecki, W., Burak, D. (2007). Parallelization Method of Encryption Algorithms. In: Pejaś, J., Saeed, K. (eds) Advances in Information Processing and Protection. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73137-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-73137-7_17

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-73136-0

  • Online ISBN: 978-0-387-73137-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics