Parallelization of Symmetric and Asymmetric security Algorithms for MultiCore Architectures
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
Symmetric and Asymmetric algorithms are complex that requires large number of mathematical computations to be done. The sequential execution of the algorithms would require a considerable amount of execution time. This may not feasible for most of the applications that require faster rate of encryption and decryption to match the required data flow. The objective of this work is to optimize the execution of Symmetric and Asymmetric algorithms at code level that is to be implemented in a MultiCore environment. In this work, code level parallelism is preferred since it can work on any architecture without any modifications. Hence, our objective is to parallelize the existing security algorithms, so that the proposed algorithm can enhance the power of MultiCore architectures thereby it leads to less run time complexity. In this work the time complexity of the most popular algorithms for parallelization since it is predominantly used in all Network Protocols and Applications. The work focuses on enhancing the performance of these algorithms by parallelizing code so that it can utilize more than one processor in MultiCore architecture efficiently for its execution.
A Study of Audio Captcha and their Limitations
Due to the massive development of Internet, security of web application has turned into a fundamental issue and numerous web applications confronting a danger of Internet Bots otherwise called Internet Robot is the autom...
Productivity Analysis of AODV and DSDV Routing Protocols In MANETs
Productivity Analysis of AODV and DSDV Routing Protocols In MANETs
Nitrate Pollution of Aya Watershed in Vandeikya Rural Area of Benue State Nigeria
Nitrate Pollution of Aya Watershed in Vandeikya Rural Area of Benue State Nigeria
A Defence Strategy against Flooding Attack Using Puzzles by Game Theory
Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of Defence strategies have been devised to overcome the flooding att...
How Business Beneficial by Collaborating With Social Media
Social media are gaining popularity and are progressively used in regular operations of many organizations, including start-ups, small, medium-sized, and large organizations. The purpose of this research is to explore th...