SlideShare a Scribd company logo
ANALYZING THE EFFECTIVENESS OF THE
ADVANCED ENCRYPTION STANDARD
ALGORITHM ON MULTICORE PROCESSOR
Presented By
Chethan B M 4BB13CS011
Nikhil Jain C S 4BB13CS021
Sharath M S 4BB13CS029
Under the guidance of
Mrs. Kavitha C.R.
Associate Professor & HOD
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
1
CONTENTS
 Aim
 Scope
 Objectives
 Methodology
 Requirement Analysis
 System Design
 Conclusion
 References
 Gantt chart
2
AIM
To implement and improve the performance
of AES algorithm by using multicore systems and
Open MP API, extracting as much parallelism as
possible from the algorithm in parallel
implementation approach.
3
SCOPE
 The requirement of information security on a network has
become highly challenging.
 Cryptography is a method to provide information
confidentiality, authenticity and integrity.
 It overcomes several challenges such as execution time,
memory requirement, and computation power.
 One cannot get desired outcomes by using sequential
computation. 4
OBJECTIVES
 To facilitate encryption and decryption of large data.
 To reduce execution time by using multicore system.
 To compare the execution time of single core and
multicore systems.
5
METHODOLOGY
6
• The input is a text file consisting of n-blocks of data.
• The first n/2 blocks can be assigned to one core.
• Another n/2 blocks can be assigned to another core.
• The encryption/decryption is done simultaneously by using the
concept of multithreading.
• This process will continue until the end of the file.
7
REQUIREMENT ANALYSIS
 Functional Requirements
 User account operation
 Creating a new account.
 Login to an existing account.
 Logout from an account.
 Delete an Account.
 Change the password.
 Retrieve the password.
 Update the profile.
 Keys component
 Generation of the key.
 Encryption component
 Uploading of a text file.
 Specifying the resultant path after encryption. 8
 Decryption component
 Uploading of a encrypted file.
 Specifying the resultant path after decryption.
 Nonfunctional Requirements
 Modifiability
 Extensibility
 Usability
 Reusability
 Scalability
 Input Requirements
 Input is given by the User as a text file.
 Output Requirements
 The encryption component gives encrypted file of the input text file.
 This encrypted file is fed as input to the decryption component which
gives the original input text.
9
 Hardware Requirements
 Processor : Intel core 2 Duo processor
 Hard Disk : 40 GB hard disk
 RAM : 2 GB RAM
 Software Requirements
 Operating System : Windows 7
 Database : MySQL
 Language : Core Java, Advanced Java
 Development Kit : JDK 1.8
 Web Server : Apache tomcat 9
 Development Tool : Eclipse
10
11
Create
account
Plain text file
Output folder
Identifier
Key
generation
Plain text file
Encrypted file
Output folder
Windows Builder
Plugins
MYSQL
AES-Encryption improved
AES-Decryption improved
Login/
Logout
Edit
Profile
Change
Password
Forgot
Password
Delete
Profile
Encryption
Decryption
Comparison
Keys
SYSTEM DESIGN
12
CONCLUSION
 The execution time of the
proposed system takes less time
when compare to the existing
system for larger text files.
13
14
References
[1] M. Nagendra and M. Chandra Sekhar ., “Performance
Improvement of Advanced Encryption Algorithm using Parallel
Computation”, International Journal of Software Engineering and Its
Applications.
[2] Supachai Thongsuk1, Prabhas Chongstitvatana., “An
implementation of AES algorithm on multicore processors for high
throughput”, Department of Computer Engineering Faculty of
Engineering, Chulalongkorn University Bangkok, Thailand.
[3] Nhat-Phuong Tran, Myungho Lee, Sigwon Hong., “Parallel
Execution of AES-CTR Algorithm Using Extended Block Size”, Dept of
Computer Science and Engineering, Myong Ji University.
cont…
15
cont…
[4] Suresh Sharma, T S B Sudarshan., “Design of an Efficient
Architecture for Advanced Encryption Standard Algorithm Using Systolic
Structures”, International Conference of High Performance Computing.
[5] Sliman Arrag1, Abdellatif Hamdoun 2, Abderrahim Tragha 3 and
Salah eddine Khamlich., “Design and Implementation A different
Architectures of mixcolumn in FPGA”, Department of Electronics and
treatment of information UNIVERSITE HASSAN II MOHAMMEDIA,
Casablanca, Morocco.
[6] Juan C. Pichel, David E. Singh and Jes´us Carretero., “Reordering
Algorithms for Increasing Locality on Multicore Processors”, Computer
Science Dpt. Universidad Carlos III de Madrid, Spain.
16
17
18
19
20
THANK YOU
QUERIES???
21

More Related Content

What's hot (20)

PDF
Ijcnc050208
IJCNCJournal
 
PDF
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
PDF
A performance evaluation of common
IJNSA Journal
 
PDF
Akshay Sanjay Kale Resume LinkedIn
Akshay Kale
 
PDF
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc
 
PDF
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
JPC Hanson
 
PDF
Parc4 i parallel implementation of
caijjournal
 
PDF
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
PPTX
A neural cryptography approach for digital image security using vigenere ciph...
WilliamY3
 
PDF
Generator of pseudorandom sequences
Venkata Sai Kalyan Routhu
 
PDF
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
PPTX
Audio Cryptography System
Raju Raj
 
PDF
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
PDF
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
 
PDF
Ridwan Fadjar Septian PyCon ID 2021 Regular Talk - django application monitor...
Ridwan Fadjar
 
PDF
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
ijwmn
 
PDF
survey paper on object oriented cryptographic security for runtime entities
INFOGAIN PUBLICATION
 
PDF
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
IJNSA Journal
 
PDF
Image Cryptography using RSA Algorithm
ijtsrd
 
PPTX
PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WI...
Thushara Maruthiyat
 
Ijcnc050208
IJCNCJournal
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
ijsrd.com
 
A performance evaluation of common
IJNSA Journal
 
Akshay Sanjay Kale Resume LinkedIn
Akshay Kale
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc
 
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
JPC Hanson
 
Parc4 i parallel implementation of
caijjournal
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
hemanthbbc
 
A neural cryptography approach for digital image security using vigenere ciph...
WilliamY3
 
Generator of pseudorandom sequences
Venkata Sai Kalyan Routhu
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
Audio Cryptography System
Raju Raj
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
 
Ridwan Fadjar Septian PyCon ID 2021 Regular Talk - django application monitor...
Ridwan Fadjar
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
ijwmn
 
survey paper on object oriented cryptographic security for runtime entities
INFOGAIN PUBLICATION
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
IJNSA Journal
 
Image Cryptography using RSA Algorithm
ijtsrd
 
PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WI...
Thushara Maruthiyat
 

Similar to Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR " (20)

DOCX
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Nikhil Jain
 
PPTX
Advance Encryption Standard and its better performance
sanacomputerscience
 
PDF
A design of a fast parallel pipelined implementation of aes advanced encrypti...
ijcsit
 
PDF
Aes
Sijo Mathew
 
PDF
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
ijsrd.com
 
PDF
Module 2 network and computer security
Deepak John
 
PDF
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
PDF
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
PDF
M021201092098
theijes
 
PDF
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
PPTX
The origin and evaluation criteria of aes
MDKAWSARAHMEDSAGAR
 
PDF
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
iosrjce
 
PDF
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
ijceronline
 
PDF
Usability of developed multiple file encryption using rijndael algorithm
Bryan Guibijar
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
Advanced approach for encryption using advanced encryption standard with chao...
IJECEIAES
 
PDF
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
 
PDF
Advanced Encryption Standard (AES)
Hardik Manocha
 
PDF
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
PDF
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
 
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Nikhil Jain
 
Advance Encryption Standard and its better performance
sanacomputerscience
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
ijcsit
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
ijsrd.com
 
Module 2 network and computer security
Deepak John
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
M021201092098
theijes
 
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
The origin and evaluation criteria of aes
MDKAWSARAHMEDSAGAR
 
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
iosrjce
 
An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced E...
ijceronline
 
Usability of developed multiple file encryption using rijndael algorithm
Bryan Guibijar
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Advanced approach for encryption using advanced encryption standard with chao...
IJECEIAES
 
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
 
Advanced Encryption Standard (AES)
Hardik Manocha
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
PDF
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
PPTX
Functions in Python Programming Language
BeulahS2
 
PDF
PRIZ Academy - Process functional modelling
PRIZ Guru
 
PPSX
OOPS Concepts in Python and Exception Handling
Dr. A. B. Shinde
 
PPT
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
PPT
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
PDF
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
PDF
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
PDF
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
PDF
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
PDF
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
PDF
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
PPTX
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
PDF
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
PDF
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
PDF
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
PPTX
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
PDF
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
輪読会資料_Miipher and Miipher2 .
NABLAS株式会社
 
Functions in Python Programming Language
BeulahS2
 
PRIZ Academy - Process functional modelling
PRIZ Guru
 
OOPS Concepts in Python and Exception Handling
Dr. A. B. Shinde
 
FINAL plumbing code for board exam passer
MattKristopherDiaz
 
SF 9_Unit 1.ppt software engineering ppt
AmarrKannthh
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Designing for Tomorrow – Architecture’s Role in the Sustainability Movement
BIM Services
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
Plant Control_EST_85520-01_en_AllChanges_20220127.pdf
DarshanaChathuranga4
 
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
Bharatiya Antariksh Hackathon 2025 Idea Submission PPT.pptx
AsadShad4
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
Ad

Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR "

  • 1. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR Presented By Chethan B M 4BB13CS011 Nikhil Jain C S 4BB13CS021 Sharath M S 4BB13CS029 Under the guidance of Mrs. Kavitha C.R. Associate Professor & HOD DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 1
  • 2. CONTENTS  Aim  Scope  Objectives  Methodology  Requirement Analysis  System Design  Conclusion  References  Gantt chart 2
  • 3. AIM To implement and improve the performance of AES algorithm by using multicore systems and Open MP API, extracting as much parallelism as possible from the algorithm in parallel implementation approach. 3
  • 4. SCOPE  The requirement of information security on a network has become highly challenging.  Cryptography is a method to provide information confidentiality, authenticity and integrity.  It overcomes several challenges such as execution time, memory requirement, and computation power.  One cannot get desired outcomes by using sequential computation. 4
  • 5. OBJECTIVES  To facilitate encryption and decryption of large data.  To reduce execution time by using multicore system.  To compare the execution time of single core and multicore systems. 5
  • 6. METHODOLOGY 6 • The input is a text file consisting of n-blocks of data. • The first n/2 blocks can be assigned to one core. • Another n/2 blocks can be assigned to another core. • The encryption/decryption is done simultaneously by using the concept of multithreading. • This process will continue until the end of the file.
  • 7. 7
  • 8. REQUIREMENT ANALYSIS  Functional Requirements  User account operation  Creating a new account.  Login to an existing account.  Logout from an account.  Delete an Account.  Change the password.  Retrieve the password.  Update the profile.  Keys component  Generation of the key.  Encryption component  Uploading of a text file.  Specifying the resultant path after encryption. 8
  • 9.  Decryption component  Uploading of a encrypted file.  Specifying the resultant path after decryption.  Nonfunctional Requirements  Modifiability  Extensibility  Usability  Reusability  Scalability  Input Requirements  Input is given by the User as a text file.  Output Requirements  The encryption component gives encrypted file of the input text file.  This encrypted file is fed as input to the decryption component which gives the original input text. 9
  • 10.  Hardware Requirements  Processor : Intel core 2 Duo processor  Hard Disk : 40 GB hard disk  RAM : 2 GB RAM  Software Requirements  Operating System : Windows 7  Database : MySQL  Language : Core Java, Advanced Java  Development Kit : JDK 1.8  Web Server : Apache tomcat 9  Development Tool : Eclipse 10
  • 11. 11 Create account Plain text file Output folder Identifier Key generation Plain text file Encrypted file Output folder Windows Builder Plugins MYSQL AES-Encryption improved AES-Decryption improved Login/ Logout Edit Profile Change Password Forgot Password Delete Profile Encryption Decryption Comparison Keys SYSTEM DESIGN
  • 12. 12
  • 13. CONCLUSION  The execution time of the proposed system takes less time when compare to the existing system for larger text files. 13
  • 14. 14 References [1] M. Nagendra and M. Chandra Sekhar ., “Performance Improvement of Advanced Encryption Algorithm using Parallel Computation”, International Journal of Software Engineering and Its Applications. [2] Supachai Thongsuk1, Prabhas Chongstitvatana., “An implementation of AES algorithm on multicore processors for high throughput”, Department of Computer Engineering Faculty of Engineering, Chulalongkorn University Bangkok, Thailand. [3] Nhat-Phuong Tran, Myungho Lee, Sigwon Hong., “Parallel Execution of AES-CTR Algorithm Using Extended Block Size”, Dept of Computer Science and Engineering, Myong Ji University. cont…
  • 15. 15 cont… [4] Suresh Sharma, T S B Sudarshan., “Design of an Efficient Architecture for Advanced Encryption Standard Algorithm Using Systolic Structures”, International Conference of High Performance Computing. [5] Sliman Arrag1, Abdellatif Hamdoun 2, Abderrahim Tragha 3 and Salah eddine Khamlich., “Design and Implementation A different Architectures of mixcolumn in FPGA”, Department of Electronics and treatment of information UNIVERSITE HASSAN II MOHAMMEDIA, Casablanca, Morocco. [6] Juan C. Pichel, David E. Singh and Jes´us Carretero., “Reordering Algorithms for Increasing Locality on Multicore Processors”, Computer Science Dpt. Universidad Carlos III de Madrid, Spain.
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19