Skip to main content

GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids

  • Conference paper
Parallel and Distributed Computing: Applications and Technologies (PDCAT 2004)

Abstract

Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an increase in computational complexity. This has promoted many researchers to develop high-performance symmetric key cryptography schemes using approaches such as the use of high-end computing hardware. Peer-to-peer (P2P) or enterprise grids are proven as one of the approaches for developing cost-effective high-end computing systems. By utilizing them, one can improve the performance of symmetric key cryptography through parallel execution. This approach makes it attractive for adoption by businesses to secure their documents. In this paper we propose and develop an application for symmetric key cryptography using enterprise grid middleware called Alchemi. An analysis and comparison of its performance is presented along with pointers to future work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wikipedia. Symmetric key algorithm. Updated March 10, 2004 (June 11, 2004), http://en.wikipedia.org/wiki/Symmetric_key_algorithm

  2. Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice Hall, New Jersey (2003)

    Google Scholar 

  3. Dongara, P., Vijaykumar, T.N.: Accelerating Private-key cryptography via Multithreading on Symmetric Multiprocessors. In: Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) (March 2003)

    Google Scholar 

  4. Burke, J., McDonald, J., Austin, T.: Architectural Support for Fast Symmetric-Key Cryptography. Advanced Computer Architecture Laboratory University of Michigan

    Google Scholar 

  5. MyCrypto.net. Encryption Algorithms (June 11, 2004), http://www.mycrypto.net/encryption/crypto_algorithms.html

  6. Pressel, D.M.: Scalability vs. Performance. U.S. Army Research Laboratory Aberdeen Proving Ground, MD 21005-5066, http://www.hpcmo.hpc.mil/Htdocs/UGC/UGC00/paper/daniel_pressel_scale_paper.pdf

  7. searchSecurity.com. Data Encryption Standard (June 11, 2004), http://searchsecurity.techtarget.com/sDefinition/0,sid14_gci213893,00.html

  8. Schneier, B.: The Blowfish Encryption Algorithm – One Year Later (June 11, 2004), http://www.schneier.com/paper-blowfish-oneyear.html

  9. searchSecurity.com. BlowFish (June 11, 2004), http://searchsecurity.techtarget.com/sDefinition/0,sid14_gci213676,00.html

  10. Jenkins Jr., R.J.: ISAAC and RC4 (June 11, 2004), http://burtleburtle.net/bob/rand/isaac.html

  11. VOCALTechnologies, Ltd. RC4 Encryption Algorithm (June 11, 2004), http://www.vocal.com/RC4.html?glad

  12. Luther, A., Buyya, R., Ranjan, R., Venugopal, S.: A.NET-based Desktop Grid Computing Framework, High Performance Computing: Paradigm and Infrastructure. In: Yang, L., Guo, M. (eds.). Wiley Press, New Jersey (Fall 2004) (in print)

    Google Scholar 

  13. Setiawan, A., Adiutama, D., Liman, J., Luther, A., Buyya, R.: GridCrypt: High Performance Symmetric Key using Enterprise Grids. Technical Report, GRIDS-TR-2004-6, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia (July 7, 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Setiawan, A., Adiutama, D., Liman, J., Luther, A., Buyya, R. (2004). GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_171

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30501-9_171

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24013-6

  • Online ISBN: 978-3-540-30501-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics