Advertisement

Parallelization Method of Encryption Algorithms

  • Wńodzimierz Bielecki
  • Dariusz Burak

Abstract

An automatic parallelization method of cryptographic algorithms such as DES, Triple DES, IDEA, AES, RC5, Blowfish, LOKI91, GOST, RSA,and data encryption standard modes of operation: CTR, CBC, CFB is presented.The method is based on the data dependency analysis of loops and well-known loop parallelization techniques. The OpenMP standard was chosen for representing the parallelism of algorithms.

Keywords

Encryption Algorithm Advance Encryption Standard Decryption Process Cryptographic Algorithm Data Encryption Standard 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, John Wiley & Sons, 2 edition, 1995Google Scholar
  2. Menezes, A.J, van Oorschot, P.C., Vanstone, S.A., Handbook of Applied Cryptography, CRC Press, 1996Google Scholar
  3. Bielecki, W., Burak, D., Exploiting Loop-Level Parallelism in the AES Algorithm, WSEAS Transactions on Computers, Issue 1, Volume 5, January 2006Google Scholar
  4. Beletskyy, V., Burak, D., Parallelization of the Data Encryption Standard (DES) Algorithm, Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, pp.23-33, Kluwer Academic Publishers 2005Google Scholar
  5. Beletskyy, V., Burak, D., Parallelization of the IDEA Algorithm, Lecture Notes in Computer Science, Computational Science- ICCS 2004: 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part I, pp.635-638, Springer-Verlag Heidelberg 2004Google Scholar
  6. Bielecki, W., Burak, D., Parallelization of Standard Modes of Operation for Symmetric Key Block Ciphers, Image Analysis, Computer Graphics, Security Systems and Artificial Intelligence Applications Vol.I (ACS-CISIM 2005), Białystok 2005Google Scholar
  7. Bielecki, W., Burak, D., Parallelization of Symmetric Block Ciphers, Computing, Multimedia and Intelligent Techniques special issue on Live Biometrics and Security, Volume 1 (2005) No.1 Published June 2005, Czestochowa University of TechnologyGoogle Scholar
  8. Burak, D., Automatyczne zrównoleglenie algorytmu Triple DES, Materiały VIII Sesji Naukowej Informatyki PS, Szczecin 2003 (in polish)Google Scholar
  9. Allen, R., Kennedy, K., Optimizing compilers for modern architectures: A Dependence- based Approach, Morgan Kaufmann Publishers, Inc., 2001Google Scholar
  10. Moldovan, D.I., Parallel Processing. From Applications to Systems, Morgan Kaufmann Publishers, Inc., 1993Google Scholar
  11. OpenMP Application Program Interface, Version 2.5, May 2005Google Scholar
  12. Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D., New User Interface for Petit and Other Extensions. User Guide. 1996Google Scholar
  13. [13]
    http://mirrors.isc.org/pub/DragonFly/dragonfly-current/src/secure/lib/libcrypt/blowfish.cGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Wńodzimierz Bielecki
    • 1
  • Dariusz Burak
    • 1
  1. 1.Szczecin University of Technology, Faculty of Computer Science and Information SystemsŻałnierska St.Poland

Personalised recommendations