ANALYZING THE EFFECTIVENESS OF THE
ADVANCED ENCRYPTION STANDARD
ALGORITHM ON MULTICORE PROCESSOR
Presented By
Chethan B M 4BB13CS011
Nikhil Jain C S 4BB13CS021
Sharath M S 4BB13CS029
Under the guidance of
Mrs. Kavitha C.R.
Associate Professor & HOD
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
1
CONTENTS
 Aim
 Scope
 Objectives
 Methodology
 Requirement Analysis
 System Design
 Conclusion
 References
 Gantt chart
2
AIM
To implement and improve the performance
of AES algorithm by using multicore systems and
Open MP API, extracting as much parallelism as
possible from the algorithm in parallel
implementation approach.
3
SCOPE
 The requirement of information security on a network has
become highly challenging.
 Cryptography is a method to provide information
confidentiality, authenticity and integrity.
 It overcomes several challenges such as execution time,
memory requirement, and computation power.
 One cannot get desired outcomes by using sequential
computation. 4
OBJECTIVES
 To facilitate encryption and decryption of large data.
 To reduce execution time by using multicore system.
 To compare the execution time of single core and
multicore systems.
5
METHODOLOGY
6
• The input is a text file consisting of n-blocks of data.
• The first n/2 blocks can be assigned to one core.
• Another n/2 blocks can be assigned to another core.
• The encryption/decryption is done simultaneously by using the
concept of multithreading.
• This process will continue until the end of the file.
7
REQUIREMENT ANALYSIS
 Functional Requirements
 User account operation
 Creating a new account.
 Login to an existing account.
 Logout from an account.
 Delete an Account.
 Change the password.
 Retrieve the password.
 Update the profile.
 Keys component
 Generation of the key.
 Encryption component
 Uploading of a text file.
 Specifying the resultant path after encryption. 8
 Decryption component
 Uploading of a encrypted file.
 Specifying the resultant path after decryption.
 Nonfunctional Requirements
 Modifiability
 Extensibility
 Usability
 Reusability
 Scalability
 Input Requirements
 Input is given by the User as a text file.
 Output Requirements
 The encryption component gives encrypted file of the input text file.
 This encrypted file is fed as input to the decryption component which
gives the original input text.
9
 Hardware Requirements
 Processor : Intel core 2 Duo processor
 Hard Disk : 40 GB hard disk
 RAM : 2 GB RAM
 Software Requirements
 Operating System : Windows 7
 Database : MySQL
 Language : Core Java, Advanced Java
 Development Kit : JDK 1.8
 Web Server : Apache tomcat 9
 Development Tool : Eclipse
10
11
Create
account
Plain text file
Output folder
Identifier
Key
generation
Plain text file
Encrypted file
Output folder
Windows Builder
Plugins
MYSQL
AES-Encryption improved
AES-Decryption improved
Login/
Logout
Edit
Profile
Change
Password
Forgot
Password
Delete
Profile
Encryption
Decryption
Comparison
Keys
SYSTEM DESIGN
12
CONCLUSION
 The execution time of the
proposed system takes less time
when compare to the existing
system for larger text files.
13
14
References
[1] M. Nagendra and M. Chandra Sekhar ., “Performance
Improvement of Advanced Encryption Algorithm using Parallel
Computation”, International Journal of Software Engineering and Its
Applications.
[2] Supachai Thongsuk1, Prabhas Chongstitvatana., “An
implementation of AES algorithm on multicore processors for high
throughput”, Department of Computer Engineering Faculty of
Engineering, Chulalongkorn University Bangkok, Thailand.
[3] Nhat-Phuong Tran, Myungho Lee, Sigwon Hong., “Parallel
Execution of AES-CTR Algorithm Using Extended Block Size”, Dept of
Computer Science and Engineering, Myong Ji University.
cont…
15
cont…
[4] Suresh Sharma, T S B Sudarshan., “Design of an Efficient
Architecture for Advanced Encryption Standard Algorithm Using Systolic
Structures”, International Conference of High Performance Computing.
[5] Sliman Arrag1, Abdellatif Hamdoun 2, Abderrahim Tragha 3 and
Salah eddine Khamlich., “Design and Implementation A different
Architectures of mixcolumn in FPGA”, Department of Electronics and
treatment of information UNIVERSITE HASSAN II MOHAMMEDIA,
Casablanca, Morocco.
[6] Juan C. Pichel, David E. Singh and Jes´us Carretero., “Reordering
Algorithms for Increasing Locality on Multicore Processors”, Computer
Science Dpt. Universidad Carlos III de Madrid, Spain.
16
17
18
19
20
THANK YOU
QUERIES???
21

More Related Content

PPTX
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
DOCX
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
DOCX
First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...
PDF
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
PDF
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
PPT
Fault Detection Scheme for AES Using Composite Field
PPTX
Bespoke Technique for Secret Messaging
PPT
File transfer with multiple security mechanism
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
Fault Detection Scheme for AES Using Composite Field
Bespoke Technique for Secret Messaging
File transfer with multiple security mechanism

What's hot (20)

PDF
Ijcnc050208
PDF
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
PDF
A performance evaluation of common
PDF
Akshay Sanjay Kale Resume LinkedIn
PDF
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
PDF
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
PDF
Parc4 i parallel implementation of
PDF
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
PPTX
A neural cryptography approach for digital image security using vigenere ciph...
PDF
Generator of pseudorandom sequences
PDF
Design and Implementation of New Encryption algorithm to Enhance Performance...
PPTX
Audio Cryptography System
PDF
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
PDF
Mini Project on Data Encryption & Decryption in JAVA
PDF
Ridwan Fadjar Septian PyCon ID 2021 Regular Talk - django application monitor...
PDF
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
PDF
survey paper on object oriented cryptographic security for runtime entities
PDF
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PDF
Image Cryptography using RSA Algorithm
PPTX
PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WI...
Ijcnc050208
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
A performance evaluation of common
Akshay Sanjay Kale Resume LinkedIn
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
Parc4 i parallel implementation of
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
A neural cryptography approach for digital image security using vigenere ciph...
Generator of pseudorandom sequences
Design and Implementation of New Encryption algorithm to Enhance Performance...
Audio Cryptography System
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Mini Project on Data Encryption & Decryption in JAVA
Ridwan Fadjar Septian PyCon ID 2021 Regular Talk - django application monitor...
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
survey paper on object oriented cryptographic security for runtime entities
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
Image Cryptography using RSA Algorithm
PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WI...
Ad

Similar to Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR " (20)

DOCX
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
PDF
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
DOC
Authenticated key exchange protocols
DOC
Authenticated key exchange protocols
PDF
Paper id 28201425
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PDF
IJSRED-V2I2P10
PDF
IoT meets Big Data
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
PPTX
dbms ppt .pptx
PDF
Advanced Encryption Standard (AES) Implementaion using Java
DOC
A securing symmetric key distribution
PDF
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWOR...
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOC
chelli ashok - resume
DOC
DOC
PDF
Performance evaluation of ecc in single and multi( eliptic curve)
PDF
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
PPTX
Phase2 -ESA capstone project work final year
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
Authenticated key exchange protocols
Authenticated key exchange protocols
Paper id 28201425
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
IJSRED-V2I2P10
IoT meets Big Data
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
dbms ppt .pptx
Advanced Encryption Standard (AES) Implementaion using Java
A securing symmetric key distribution
IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWOR...
Key aggregate cryptosystem for scalable data sharing in cloud storage
chelli ashok - resume
Performance evaluation of ecc in single and multi( eliptic curve)
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
Phase2 -ESA capstone project work final year
Ad

Recently uploaded (20)

DOC
T Pandian CV Madurai pandi kokkaf illaya
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Introduction to Power System StabilityPS
PDF
Cryptography and Network Security-Module-I.pdf
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PPTX
ai_satellite_crop_management_20250815030350.pptx
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
Unit1 - AIML Chapter 1 concept and ethics
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
Software Engineering and software moduleing
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
T Pandian CV Madurai pandi kokkaf illaya
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Introduction to Power System StabilityPS
Cryptography and Network Security-Module-I.pdf
Computer System Architecture 3rd Edition-M Morris Mano.pdf
August -2025_Top10 Read_Articles_ijait.pdf
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
ai_satellite_crop_management_20250815030350.pptx
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
MLpara ingenieira CIVIL, meca Y AMBIENTAL
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Unit1 - AIML Chapter 1 concept and ethics
distributed database system" (DDBS) is often used to refer to both the distri...
Software Engineering and software moduleing
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx

Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR "

  • 1. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR Presented By Chethan B M 4BB13CS011 Nikhil Jain C S 4BB13CS021 Sharath M S 4BB13CS029 Under the guidance of Mrs. Kavitha C.R. Associate Professor & HOD DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 1
  • 2. CONTENTS  Aim  Scope  Objectives  Methodology  Requirement Analysis  System Design  Conclusion  References  Gantt chart 2
  • 3. AIM To implement and improve the performance of AES algorithm by using multicore systems and Open MP API, extracting as much parallelism as possible from the algorithm in parallel implementation approach. 3
  • 4. SCOPE  The requirement of information security on a network has become highly challenging.  Cryptography is a method to provide information confidentiality, authenticity and integrity.  It overcomes several challenges such as execution time, memory requirement, and computation power.  One cannot get desired outcomes by using sequential computation. 4
  • 5. OBJECTIVES  To facilitate encryption and decryption of large data.  To reduce execution time by using multicore system.  To compare the execution time of single core and multicore systems. 5
  • 6. METHODOLOGY 6 • The input is a text file consisting of n-blocks of data. • The first n/2 blocks can be assigned to one core. • Another n/2 blocks can be assigned to another core. • The encryption/decryption is done simultaneously by using the concept of multithreading. • This process will continue until the end of the file.
  • 7. 7
  • 8. REQUIREMENT ANALYSIS  Functional Requirements  User account operation  Creating a new account.  Login to an existing account.  Logout from an account.  Delete an Account.  Change the password.  Retrieve the password.  Update the profile.  Keys component  Generation of the key.  Encryption component  Uploading of a text file.  Specifying the resultant path after encryption. 8
  • 9.  Decryption component  Uploading of a encrypted file.  Specifying the resultant path after decryption.  Nonfunctional Requirements  Modifiability  Extensibility  Usability  Reusability  Scalability  Input Requirements  Input is given by the User as a text file.  Output Requirements  The encryption component gives encrypted file of the input text file.  This encrypted file is fed as input to the decryption component which gives the original input text. 9
  • 10.  Hardware Requirements  Processor : Intel core 2 Duo processor  Hard Disk : 40 GB hard disk  RAM : 2 GB RAM  Software Requirements  Operating System : Windows 7  Database : MySQL  Language : Core Java, Advanced Java  Development Kit : JDK 1.8  Web Server : Apache tomcat 9  Development Tool : Eclipse 10
  • 11. 11 Create account Plain text file Output folder Identifier Key generation Plain text file Encrypted file Output folder Windows Builder Plugins MYSQL AES-Encryption improved AES-Decryption improved Login/ Logout Edit Profile Change Password Forgot Password Delete Profile Encryption Decryption Comparison Keys SYSTEM DESIGN
  • 12. 12
  • 13. CONCLUSION  The execution time of the proposed system takes less time when compare to the existing system for larger text files. 13
  • 14. 14 References [1] M. Nagendra and M. Chandra Sekhar ., “Performance Improvement of Advanced Encryption Algorithm using Parallel Computation”, International Journal of Software Engineering and Its Applications. [2] Supachai Thongsuk1, Prabhas Chongstitvatana., “An implementation of AES algorithm on multicore processors for high throughput”, Department of Computer Engineering Faculty of Engineering, Chulalongkorn University Bangkok, Thailand. [3] Nhat-Phuong Tran, Myungho Lee, Sigwon Hong., “Parallel Execution of AES-CTR Algorithm Using Extended Block Size”, Dept of Computer Science and Engineering, Myong Ji University. cont…
  • 15. 15 cont… [4] Suresh Sharma, T S B Sudarshan., “Design of an Efficient Architecture for Advanced Encryption Standard Algorithm Using Systolic Structures”, International Conference of High Performance Computing. [5] Sliman Arrag1, Abdellatif Hamdoun 2, Abderrahim Tragha 3 and Salah eddine Khamlich., “Design and Implementation A different Architectures of mixcolumn in FPGA”, Department of Electronics and treatment of information UNIVERSITE HASSAN II MOHAMMEDIA, Casablanca, Morocco. [6] Juan C. Pichel, David E. Singh and Jes´us Carretero., “Reordering Algorithms for Increasing Locality on Multicore Processors”, Computer Science Dpt. Universidad Carlos III de Madrid, Spain.
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19