SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 336
Performance Analysis of Encryption Algorithm for Network Security on
Parallel Computing Environment
A. Varalakshmi Harika1
T. Saranya2
M. Narayana Moorthi3
1,2,3
Department of Computing Science and Engineering
1,2,3
VIT University, Vellore
Abstract— Nowadays the typical desktop computer
processors have four or more independent CPU core, which
are called as multi-core processors to execute instructions.
So parallel programming language come into play to
execute instructions concurrently for multi core architecture
using openMP. Users prefer cryptographic algorithms to
encrypt and decrypt data in order to send it securely over an
unsafe environment like the internet. This paper describes
the implementation and test results of Caesar cipher and
RSA cryptographic algorithms in parallelization are done
using OpenMP API 3.1 Standard and performance Analysis.
According to our test results, the parallel design approach
for security algorithm exhibits improved performance over
the sequential approach in terms of execution of time
Key words: OpenMP, API, CPU, PVM
I. INTRODUCTION
Network security [1] is responsible for protecting data from
unauthorized access. It comprises three main pillars:
confidentiality, integrity and availability. Confidentiality
means restricting unauthorized parties from obtaining
information. Integrity means the data has not been changed
after it had been sent and before receiving it. Availability
means the data is available at any time it is requested,
whereas the requesting party is authorized. Confidentiality
and integrity is being done using cryptography [6].
Availability is being done by another technique.
A. Cryptography
The art or science contains the methods of transforming a
plain message into cipher message [4], and then
retransforming that message back to its original form.
1) Basic terminology
Plaintext: Original Message.
Ciphertext: Coded message.
Cipher: Algorithm for transforming [7] plaintext to cipher
text.
Key: Information used in cipher to encrypt and decrypt.
Encipher: Converting plaintext to ciphertext.
Decipher: Recovering cipher text from plaintext.
Fig. 1: Diagrammatic Representation of basic terminology
B. Parallel Programming
The principle of parallel computing are large problems can
be divided into smaller ones, and are the solved
concurrently.
It enhances the performance of the program and reduces the
execution time.
Different forms of parallel computing
 Bit Level
 Instruction Level
 Data parallelism
 Task Parallelism
Use:
 Save time/Money
 Solve larger problems
 Provide concurrency
 Use of non Local resources
Parallel Programming language allows us to explicitly
indicate how the different portions of the computation may
be executed concurrently by the different processors.
A lot of techniques available such as PVM (Parallel
Virtual Machine), MPI (Multiple Process Interface),
pthreads, OpenMP (Open Multi Processing), Intel CT,
charm, cilk, TBB (Threading Building Blocks), OpenCL
(Open Computing Language), can be considered as
programming models to evaluate parallel processing
environment. In this paper we will analyze the performance
through OpenMP.
OpenMP: OpenMP [2] stands for Open Multi
Processing, which is a portable shared memory application
programming interface (API) for writing shared memory
parallel applications in c, c++ and FORTRAN. OpenMP
API Consists of Compiler Directives. Runtime
subroutines/functions. Environment variables. It uses
typically Fork-Join Model to achieve parallelism. The
parallel task is specified by #pragma omp parallel .This is
the way we specify the explicit parallelism.
II. PROPOSED ALGORITHM
A. Caesar Cipher
In this algorithm, each letter of the message can be replaced
[8] by a letter a fixed distance away.
Description of Algorithm:
Encryption E (k):
I → i + k mod 26
Decryption D (k):
I → i - k mod 26
Observation values for serial and parallel is shown in the
following table.
B. Serial
Observation Values
Plain
text(Input)
Characters Key
value(Input)
Execution
time(Output)
Welcome 7 3 30.289
Network 7 18 9.9873
Network 15 780 6.6728
Performance Analysis of Encryption Algorithm for Network Security on Parallel Computing Environment
(IJSRD/Vol. 2/Issue 07/2014/076)
All rights reserved by www.ijsrd.com 337
Security
Parallel
programming
20 10987 8.9521
Cyber security 14 1089997 12.965
Table 1: Table representation of observation values
Fig. 2: Graphical Representation of performance analysis of
Caesar cipher in Serial
C. Parallel
Observation Values:
Plain text Charact
ers
Key
value(Inp
ut)
Execution
time(Outp
ut)
Speed
Up
Welcome 7 3 9698 0.0031
23
Network 7 9 6250 0.0015
97
Network
Security
14 789 11003 6.0645
27
Parallel
Programm
ing
19 10345 13196 6.7839
49
Cyber
Security
13 178966 17450 7.4297
99
Table 2: Table representation of observation values
Fig. 3: Graphical Representation of performance analysis of
Caesar cipher in parallel
D. RSA
Description of Algorithm:
The RSA algorithm involves 3 steps:
1) Key generation
 Choose 2 distinct prime [4] numbers p and q.
 Calculate n such that n=PQ.
N will be used as the modules for both the
public & private keys.
 Calculate the totient of n,ᴓ(n)
 ᴓ (n) = (p-1) (q-1)
 Choose a prime number e,such that e is co-prime to
ᴓ(n)
 Ie e and ᴓ (n) does not have common divisors other
than 1.
E is kept as the public key eponent.
 Public key is (n, e).
 Private key calculation:
 E*j=1[mod ᴓ (n)]
2) Encryption
Pe
=E (mod n)
3) Decryption
Ej
=p (mod n)
a) Serial
Observation Values
Prime
numbers
E Plain
text
Cipher
Text
Execution
time(sec)
3,17 5 13 12 16.60253
3,11 3 13 16 18.62890
5,15 3 13 14 7.447266
7,17 5 13 15 12.85742
7,13 7 13 16 8.453125
Table 3: Table representation of observation values
Performance Analysis of Encryption Algorithm for Network Security on Parallel Computing Environment
(IJSRD/Vol. 2/Issue 07/2014/076)
All rights reserved by www.ijsrd.com 338
Fig. 4: Graphical Representation of performance analysis of
RSA in serial
b) Parallel
Observation Values:
Prime
numbers
E Plain
text
Cipher
Text
Execution
time(ms)
Speed
Up
3,17 5 13 12 8418 0.00197
3,11 3 13 16 8932 0.00208
5,15 3 13 14 10454 7.12384
7,17 5 13 15 26661 4.82254
7,13 7 13 16 20377 4.14836
Table 4: Table representation of RSA
Figure 5: Graphical Representation of performance analysis
of RSA in parallel
III. CONCLUSION AND FUTURE WORK
I conclude my paper saying that using OpenMP we
proposed two algorithms and perform the analysis of the
algorithms with different observation values as the program
execution time decreases using parallel computing. For
Network related issues, much more advanced security
measures have to be taken because many hackers and many
algorithms are there to break the authentication information
by unknown users, which lead to great loss. Hence Network
security challenges have to be improved in future using
advanced technology systems.
REFERENCES
[1] “Network Security”, http://isc.sans.edu/presentations.
[2] “Guide to open MP” ,
http://bisqwit.iki.fi/story/howto/openmp/.
[3] Ferguson,”Cryptography Engineering: Design
principles and Practical applications”, 2010.
[4] Dr.Sudesh Jakhar,”Distinction between Secret key and
Public key Cryptography”, IJEIM, vol.1, 2012.
[5] Yogesh Kumar,”comparison of symmetric and
asymmetric cryptography”, IJCMS 2011.
[6] Atul Kahte, “Cryptography, Network Security”, 2nd
Edition.
[7] W. Diffie, Directions in Cryptography, 2009.
[8] Himani Agarwal, Analysis of various Cryptography,
Dec-2010.
[9] X. Qin, Jiang, “Driven scheduling of parallel real-time
jobs”, Computer Science, New Mexico Institute of
Mining and Technology”, ACM, pp.1-29, 2000.
[10]K. Bella, jong,” Improving Security of Real-time
Systems with Nonuniform Distribution of Checkpoints
“, International conference on computer
communication network (ICCCN), pp.1-7, Aug 2007.
[11]G. Manimaran and C. S. R. Murthy," An efficient
scheduling algorithm for Multi Machine systems”,
IJACR, pp.48-55, Volume-2,Decemeber-2012.
[12]T. Nandagopal, Kim, GAO, “MAC Layer wireless
packet networks”, IEEE, pp.2-5,June 1999.
[13]T. Karygiannis,” Bluetooth and Handheld Devices”,
NIST Publication, pp.2-7,November 2002.
[14]Yongguang Zhang ,Wenke Lee, Yi-An Huang, College
of Computing, Georgia Institute of Technology,
“Mobile Wireless Networks”, pp.1-16, Feb.2003.
[15]Manisha, Gaurav Gupta, Department of Computer
Science Engineering , “Wireless Sensor Network
Attacks”, International Journal of Advanced Research
in Computer Science and Software Engineering,
Volume 3, pp.1-8, October 2013.
[16]Jaspher W. Kathrine, Arun Raj,School of Computer
Science and Technology, “Packet Scheduling
Algorithms in Different Wireless Technology”, IJERT,
Vol.ume 1,pp.1-6, October – 2012.
[17]Rachana A Gupta, Mo-Yuen Chow, Avesh Kumar
Agarwal, Wenye Wang, Electrical and Computer
Engineering, “Performance assessment for next
generation wireless distributed network systems”,
pp.1-6, Nov-2013.
Ad

Recommended

“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
IDES Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Image Encryption and Compression
Image Encryption and Compression
Sayantan Sur
 
Template Protection with Homomorphic Encryption
Template Protection with Homomorphic Encryption
Tolun Tosun
 
Thesis Background
Thesis Background
Abdullah Metwally
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
IJORCS
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
Mumbai Academisc
 
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
ijcseit
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
Ew4301904907
Ew4301904907
IJERA Editor
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
IDES Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 
Secure image encryption using aes
Secure image encryption using aes
eSAT Publishing House
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
AM Publications
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
Alexander Decker
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
M021201092098
M021201092098
theijes
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
IJMER
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
theijes
 
Image Security
Image Security
Satyendra Rajput
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
xlyle
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Image encryption and decryption
Image encryption and decryption
Aashish R
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 
Meaghan_Crain_Portfolio
Meaghan_Crain_Portfolio
Meaghan Crain
 
eng.sameh elsobky
eng.sameh elsobky
Eng.Sameh EI Sobky
 
M El Sherif IADC Cert
M El Sherif IADC Cert
Mohammed El-Sherif
 

More Related Content

What's hot (19)

Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
ijcseit
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
Ew4301904907
Ew4301904907
IJERA Editor
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
IDES Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 
Secure image encryption using aes
Secure image encryption using aes
eSAT Publishing House
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
AM Publications
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
Alexander Decker
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
M021201092098
M021201092098
theijes
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
IJMER
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
theijes
 
Image Security
Image Security
Satyendra Rajput
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
xlyle
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Image encryption and decryption
Image encryption and decryption
Aashish R
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
ijcseit
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
IDES Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
AM Publications
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
Alexander Decker
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
M021201092098
M021201092098
theijes
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
IJMER
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
theijes
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
xlyle
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Image encryption and decryption
Image encryption and decryption
Aashish R
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 

Viewers also liked (18)

Meaghan_Crain_Portfolio
Meaghan_Crain_Portfolio
Meaghan Crain
 
eng.sameh elsobky
eng.sameh elsobky
Eng.Sameh EI Sobky
 
M El Sherif IADC Cert
M El Sherif IADC Cert
Mohammed El-Sherif
 
Reading intermediate
Reading intermediate
Marcos Linares
 
Introduction page 1
Introduction page 1
Sourav Jana
 
Getting the right picture
Getting the right picture
Mohammed Awad
 
"Earthworks Management: Have we got our designs right?"
"Earthworks Management: Have we got our designs right?"
Remedy Geotechnics Ltd
 
Ansys questions 150803
Ansys questions 150803
jairameshbabu
 
G32 Rapids
G32 Rapids
Ellen Burkhardt
 
Session4 local manufacturing experiences from the mena region authored and_o...
Session4 local manufacturing experiences from the mena region authored and_o...
RCREEE
 
Session1 program of solar water heater promotion in tunisia prosol (anme - ...
Session1 program of solar water heater promotion in tunisia prosol (anme - ...
RCREEE
 
PDSA - Front Board Rev - OFC
PDSA - Front Board Rev - OFC
alfred lopez
 
(12 03-13)--wind effects
(12 03-13)--wind effects
Rajesh Sharma
 
U1 ii
U1 ii
inesferrer
 
Ground improvement techniques
Ground improvement techniques
Qasim Virk
 
بحث حول تصميم مبانى مراكز الابحاث للطاقة المتجددة
بحث حول تصميم مبانى مراكز الابحاث للطاقة المتجددة
mohmimare
 
Extreme Apache Spark: how in 3 months we created a pipeline that can process ...
Extreme Apache Spark: how in 3 months we created a pipeline that can process ...
Josef A. Habdank
 
Aircraft Maintenance Documentation
Aircraft Maintenance Documentation
FAA Safety Team Central Florida
 
Meaghan_Crain_Portfolio
Meaghan_Crain_Portfolio
Meaghan Crain
 
Introduction page 1
Introduction page 1
Sourav Jana
 
Getting the right picture
Getting the right picture
Mohammed Awad
 
"Earthworks Management: Have we got our designs right?"
"Earthworks Management: Have we got our designs right?"
Remedy Geotechnics Ltd
 
Ansys questions 150803
Ansys questions 150803
jairameshbabu
 
Session4 local manufacturing experiences from the mena region authored and_o...
Session4 local manufacturing experiences from the mena region authored and_o...
RCREEE
 
Session1 program of solar water heater promotion in tunisia prosol (anme - ...
Session1 program of solar water heater promotion in tunisia prosol (anme - ...
RCREEE
 
PDSA - Front Board Rev - OFC
PDSA - Front Board Rev - OFC
alfred lopez
 
(12 03-13)--wind effects
(12 03-13)--wind effects
Rajesh Sharma
 
Ground improvement techniques
Ground improvement techniques
Qasim Virk
 
بحث حول تصميم مبانى مراكز الابحاث للطاقة المتجددة
بحث حول تصميم مبانى مراكز الابحاث للطاقة المتجددة
mohmimare
 
Extreme Apache Spark: how in 3 months we created a pipeline that can process ...
Extreme Apache Spark: how in 3 months we created a pipeline that can process ...
Josef A. Habdank
 
Ad

Similar to Performance Analysis of Encryption Algorithm for Network Security on Parallel Computing Environment (20)

IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
An implementation of RSA policy
An implementation of RSA policy
SM NAZMUS SALEHIN
 
Unit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Rass presentation
Rass presentation
Shalini Guha
 
State of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
6. cryptography
6. cryptography
7wounders
 
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
asjadzaki2021
 
Net
Net
Raviteja
 
Harvard poster
Harvard poster
Alysson Almeida
 
Cryptography and applications
Cryptography and applications
thai
 
Data security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 
Network Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Cryptography and network security
Cryptography and network security
Nagendra Um
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
IJNSA Journal
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
Tuhin_Das
 
Unit --3.ppt
Unit --3.ppt
DHANABALSUBRAMANIAN
 
Ch34508510
Ch34508510
IJERA Editor
 
Cryptography and Network Security
Cryptography and Network Security
Ramki M
 
Computer and Network Security
Computer and Network Security
Muhammad Yousuf Abdul Qadir
 
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
An implementation of RSA policy
An implementation of RSA policy
SM NAZMUS SALEHIN
 
State of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
6. cryptography
6. cryptography
7wounders
 
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
asjadzaki2021
 
Cryptography and applications
Cryptography and applications
thai
 
Network Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Cryptography and network security
Cryptography and network security
Nagendra Um
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
IJNSA Journal
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
Tuhin_Das
 
Cryptography and Network Security
Cryptography and Network Security
Ramki M
 
Ad

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 
IoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

Recently uploaded (20)

English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
How to Manage Different Customer Addresses in Odoo 18 Accounting
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
 
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Tanja Vujicic - PISA for Schools contact Info
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
Intellectual Property Right (Jurisprudence).pptx
Intellectual Property Right (Jurisprudence).pptx
Vishal Chanalia
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
Chalukyas of Gujrat, Solanki Dynasty NEP.pptx
Chalukyas of Gujrat, Solanki Dynasty NEP.pptx
Dr. Ravi Shankar Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
2025 June Year 9 Presentation: Subject selection.pptx
2025 June Year 9 Presentation: Subject selection.pptx
mansk2
 
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
parmarjuli1412
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
How to Manage Different Customer Addresses in Odoo 18 Accounting
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
 
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
 
Tanja Vujicic - PISA for Schools contact Info
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
Intellectual Property Right (Jurisprudence).pptx
Intellectual Property Right (Jurisprudence).pptx
Vishal Chanalia
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
2025 June Year 9 Presentation: Subject selection.pptx
2025 June Year 9 Presentation: Subject selection.pptx
mansk2
 
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
parmarjuli1412
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
Aprendendo Arquitetura Framework Salesforce - Dia 02
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 

Performance Analysis of Encryption Algorithm for Network Security on Parallel Computing Environment

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 336 Performance Analysis of Encryption Algorithm for Network Security on Parallel Computing Environment A. Varalakshmi Harika1 T. Saranya2 M. Narayana Moorthi3 1,2,3 Department of Computing Science and Engineering 1,2,3 VIT University, Vellore Abstract— Nowadays the typical desktop computer processors have four or more independent CPU core, which are called as multi-core processors to execute instructions. So parallel programming language come into play to execute instructions concurrently for multi core architecture using openMP. Users prefer cryptographic algorithms to encrypt and decrypt data in order to send it securely over an unsafe environment like the internet. This paper describes the implementation and test results of Caesar cipher and RSA cryptographic algorithms in parallelization are done using OpenMP API 3.1 Standard and performance Analysis. According to our test results, the parallel design approach for security algorithm exhibits improved performance over the sequential approach in terms of execution of time Key words: OpenMP, API, CPU, PVM I. INTRODUCTION Network security [1] is responsible for protecting data from unauthorized access. It comprises three main pillars: confidentiality, integrity and availability. Confidentiality means restricting unauthorized parties from obtaining information. Integrity means the data has not been changed after it had been sent and before receiving it. Availability means the data is available at any time it is requested, whereas the requesting party is authorized. Confidentiality and integrity is being done using cryptography [6]. Availability is being done by another technique. A. Cryptography The art or science contains the methods of transforming a plain message into cipher message [4], and then retransforming that message back to its original form. 1) Basic terminology Plaintext: Original Message. Ciphertext: Coded message. Cipher: Algorithm for transforming [7] plaintext to cipher text. Key: Information used in cipher to encrypt and decrypt. Encipher: Converting plaintext to ciphertext. Decipher: Recovering cipher text from plaintext. Fig. 1: Diagrammatic Representation of basic terminology B. Parallel Programming The principle of parallel computing are large problems can be divided into smaller ones, and are the solved concurrently. It enhances the performance of the program and reduces the execution time. Different forms of parallel computing  Bit Level  Instruction Level  Data parallelism  Task Parallelism Use:  Save time/Money  Solve larger problems  Provide concurrency  Use of non Local resources Parallel Programming language allows us to explicitly indicate how the different portions of the computation may be executed concurrently by the different processors. A lot of techniques available such as PVM (Parallel Virtual Machine), MPI (Multiple Process Interface), pthreads, OpenMP (Open Multi Processing), Intel CT, charm, cilk, TBB (Threading Building Blocks), OpenCL (Open Computing Language), can be considered as programming models to evaluate parallel processing environment. In this paper we will analyze the performance through OpenMP. OpenMP: OpenMP [2] stands for Open Multi Processing, which is a portable shared memory application programming interface (API) for writing shared memory parallel applications in c, c++ and FORTRAN. OpenMP API Consists of Compiler Directives. Runtime subroutines/functions. Environment variables. It uses typically Fork-Join Model to achieve parallelism. The parallel task is specified by #pragma omp parallel .This is the way we specify the explicit parallelism. II. PROPOSED ALGORITHM A. Caesar Cipher In this algorithm, each letter of the message can be replaced [8] by a letter a fixed distance away. Description of Algorithm: Encryption E (k): I → i + k mod 26 Decryption D (k): I → i - k mod 26 Observation values for serial and parallel is shown in the following table. B. Serial Observation Values Plain text(Input) Characters Key value(Input) Execution time(Output) Welcome 7 3 30.289 Network 7 18 9.9873 Network 15 780 6.6728
  • 2. Performance Analysis of Encryption Algorithm for Network Security on Parallel Computing Environment (IJSRD/Vol. 2/Issue 07/2014/076) All rights reserved by www.ijsrd.com 337 Security Parallel programming 20 10987 8.9521 Cyber security 14 1089997 12.965 Table 1: Table representation of observation values Fig. 2: Graphical Representation of performance analysis of Caesar cipher in Serial C. Parallel Observation Values: Plain text Charact ers Key value(Inp ut) Execution time(Outp ut) Speed Up Welcome 7 3 9698 0.0031 23 Network 7 9 6250 0.0015 97 Network Security 14 789 11003 6.0645 27 Parallel Programm ing 19 10345 13196 6.7839 49 Cyber Security 13 178966 17450 7.4297 99 Table 2: Table representation of observation values Fig. 3: Graphical Representation of performance analysis of Caesar cipher in parallel D. RSA Description of Algorithm: The RSA algorithm involves 3 steps: 1) Key generation  Choose 2 distinct prime [4] numbers p and q.  Calculate n such that n=PQ. N will be used as the modules for both the public & private keys.  Calculate the totient of n,ᴓ(n)  ᴓ (n) = (p-1) (q-1)  Choose a prime number e,such that e is co-prime to ᴓ(n)  Ie e and ᴓ (n) does not have common divisors other than 1. E is kept as the public key eponent.  Public key is (n, e).  Private key calculation:  E*j=1[mod ᴓ (n)] 2) Encryption Pe =E (mod n) 3) Decryption Ej =p (mod n) a) Serial Observation Values Prime numbers E Plain text Cipher Text Execution time(sec) 3,17 5 13 12 16.60253 3,11 3 13 16 18.62890 5,15 3 13 14 7.447266 7,17 5 13 15 12.85742 7,13 7 13 16 8.453125 Table 3: Table representation of observation values
  • 3. Performance Analysis of Encryption Algorithm for Network Security on Parallel Computing Environment (IJSRD/Vol. 2/Issue 07/2014/076) All rights reserved by www.ijsrd.com 338 Fig. 4: Graphical Representation of performance analysis of RSA in serial b) Parallel Observation Values: Prime numbers E Plain text Cipher Text Execution time(ms) Speed Up 3,17 5 13 12 8418 0.00197 3,11 3 13 16 8932 0.00208 5,15 3 13 14 10454 7.12384 7,17 5 13 15 26661 4.82254 7,13 7 13 16 20377 4.14836 Table 4: Table representation of RSA Figure 5: Graphical Representation of performance analysis of RSA in parallel III. CONCLUSION AND FUTURE WORK I conclude my paper saying that using OpenMP we proposed two algorithms and perform the analysis of the algorithms with different observation values as the program execution time decreases using parallel computing. For Network related issues, much more advanced security measures have to be taken because many hackers and many algorithms are there to break the authentication information by unknown users, which lead to great loss. Hence Network security challenges have to be improved in future using advanced technology systems. REFERENCES [1] “Network Security”, http://isc.sans.edu/presentations. [2] “Guide to open MP” , http://bisqwit.iki.fi/story/howto/openmp/. [3] Ferguson,”Cryptography Engineering: Design principles and Practical applications”, 2010. [4] Dr.Sudesh Jakhar,”Distinction between Secret key and Public key Cryptography”, IJEIM, vol.1, 2012. [5] Yogesh Kumar,”comparison of symmetric and asymmetric cryptography”, IJCMS 2011. [6] Atul Kahte, “Cryptography, Network Security”, 2nd Edition. [7] W. Diffie, Directions in Cryptography, 2009. [8] Himani Agarwal, Analysis of various Cryptography, Dec-2010. [9] X. Qin, Jiang, “Driven scheduling of parallel real-time jobs”, Computer Science, New Mexico Institute of Mining and Technology”, ACM, pp.1-29, 2000. [10]K. Bella, jong,” Improving Security of Real-time Systems with Nonuniform Distribution of Checkpoints “, International conference on computer communication network (ICCCN), pp.1-7, Aug 2007. [11]G. Manimaran and C. S. R. Murthy," An efficient scheduling algorithm for Multi Machine systems”, IJACR, pp.48-55, Volume-2,Decemeber-2012. [12]T. Nandagopal, Kim, GAO, “MAC Layer wireless packet networks”, IEEE, pp.2-5,June 1999. [13]T. Karygiannis,” Bluetooth and Handheld Devices”, NIST Publication, pp.2-7,November 2002. [14]Yongguang Zhang ,Wenke Lee, Yi-An Huang, College of Computing, Georgia Institute of Technology, “Mobile Wireless Networks”, pp.1-16, Feb.2003. [15]Manisha, Gaurav Gupta, Department of Computer Science Engineering , “Wireless Sensor Network Attacks”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, pp.1-8, October 2013. [16]Jaspher W. Kathrine, Arun Raj,School of Computer Science and Technology, “Packet Scheduling Algorithms in Different Wireless Technology”, IJERT, Vol.ume 1,pp.1-6, October – 2012. [17]Rachana A Gupta, Mo-Yuen Chow, Avesh Kumar Agarwal, Wenye Wang, Electrical and Computer Engineering, “Performance assessment for next generation wireless distributed network systems”, pp.1-6, Nov-2013.