Skip to main content

Performance Analysis of PBlock Algorithm Implemented Using SIMD Model to Attain Parallelism

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 338))

Abstract

Software applications are driving the growth of cloud computing era. The security of data over the networks is essential in order to enable cloud computing applications. The security of data is ensured through the use of various types of encryption algorithms. In the current cloud computing era we are witnessing the use of multi core processors which has enabled us to run security applications, simultaneously at both client and the server end. The encryption as well as decryption process of security algorithms is compute intensive and can take significant benefit from parallel implementations that can run on these multi core processors. Moreover these algorithms will consume more energy on uniprocessor systems due to the massive calculations they do, because there is a non-linear relationship between frequency of a core and power supply. This paper introduces a parallel version of Blowfish algorithm using Single Instruction Multiple Data model which is named as PBlock and its implementation on a Symmetric Multi Processor machine along with the results of performance gains that we have obtained on a number of benchmark examples.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stallings, B.: Computer Security: Principles and Practice. Prentice Hall, Upper Saddle River (2008)

    Google Scholar 

  2. Chapman, J., Der Pas, R.V.: Using OpenMP: Portable Shared Memory Parallel Programming. MIT Press (2008)

    Google Scholar 

  3. Damrudi, M., Ithnin, N.: State of the Art Practical Parallel Cryptographic Approaches. J. Basic and Applied Sciences, 660–677 (2011) ISSN 1991-8178

    Google Scholar 

  4. Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  5. Elmina, D., Kader, H., Hadhoud, M.: Evaluating the performance of symmetric encryption algorithms. Int. Journal of Network Security 10(3), 213–219 (2010)

    Google Scholar 

  6. Krishnamurthy, G.N., Ramaswamy, V., Leela, G.H., Ashalatha, M.E.: Performance enhancement of Blowfish and cast-128 algorithms and security analysis of improved blowfish algorithm using AVALANCHE effect. Int. Journal of Computer Science and Network Security 8(3), 244–250 (2008)

    Google Scholar 

  7. https://software.intel.com/en-us/articles/getting-started-with-openmp

  8. Dongara, P., Vijaykumar, T.N.: Accelerating private-key cryptography via multithreading on symmetric multiprocessors. In: Proc. IEEE Int’l Symp. Performance Analysis of Systems and Software. IEEE Press (2003)

    Google Scholar 

  9. Vanitha, M., Selvakumar, R., Subha, S.: hardware and software implementation for highly secured modified wired equivalent privacy (MdWEP). J. Theoretical and Applied Information Technology 48(2) (2013)

    Google Scholar 

  10. http://openmp.org/wp/2013/12/tutorial-introduction-to-openmp/

  11. Kholidy, H.A., Alghathbar, K.S.: Adapting and accelerating the stream cipher algorithm “RC4” using “ultra gridsec” and “HIMAN” and use it to secure “HIMAN” data. J. Information Assurance and Security, 274–283 (2009)

    Google Scholar 

  12. Tsoi, K.H., Lee, K.H., Leong, P.H.W.: A massively parallel RC4 key search engine (With FPGA). In: Proc. Tenth Annual IEEE Symposium on Field-Programmable Custom Computing Machines. IEEE Press (2002)

    Google Scholar 

  13. Sastry, V.U.K., Anup Kumar, K.: A Modified Feistel Cipher Involving Substitution, shifting of rows, mixing of columns, XOR operation with a Key and Shuffling. Int. J Advanced Computer Science and Applications 3(8), 23–29 (2012)

    Google Scholar 

  14. http://www.ibm.com/developerworks/library/l-gnuprof.html

  15. http://sourceware.org/binutils/docs/gprof/

  16. Karthigai Kumara, P., Baskaranb, K.: An ASIC implementation of low power and high throughput blowfish crypto algorithm. Microelectronics Journal 41, 347–355 (2010)

    Article  Google Scholar 

  17. Weerasinghe, T.D.B.: Improving throughput of RC4 algorithm using multithreading techniques in multicore processors. Int. J. Computer Applications 51(22), 45–51 (2012) ISSN 0975-8887

    Article  Google Scholar 

  18. Karthigaikumar, P., Baskaran, K.: Partially pipelined vlsi implementation of blowfish encryption/decryption algorithm. Int. J. Image and Graphics 10, 327 (2010)

    Article  MathSciNet  Google Scholar 

  19. Ebadi, K., Pena, V., Liu, C.: High-Performance Implementation and Evaluation of Blowfish Cryptographic Algorithm on Single-Chip Cloud Compute: A Pipelined Approach. In: Proc. International Conference on Applied and Theoretical Information Systems Research (2012)

    Google Scholar 

  20. Handa, D., Kapoor, B.: PARC4: High performance implementation of RC4 cryptographic algorithm using parallelism. In: Proc. International Conference on Optimization, Reliabilty and Information, pp. 286–289 (2014)

    Google Scholar 

  21. Handa, D., Kapoor, B.: State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher. IJCSA 4(4), 27–37 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Disha Handa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Handa, D., Kapoor, B. (2015). Performance Analysis of PBlock Algorithm Implemented Using SIMD Model to Attain Parallelism. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13731-5_9

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13730-8

  • Online ISBN: 978-3-319-13731-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics