Towards Performance Analysis of Symmetric Key Algorithm on n-Core Systems: An IOT Perspective
Manju Suchdeo1 , Deepak Mawane2 , Mahek Negandhi3 , Shipra Sarkar4 , Shaligram Prajapat5
Section:Technical Paper, Product Type: Journal Paper
Volume-6 ,
Issue-6 , Page no. 1127-1129, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.11271129
Online published on Jun 30, 2018
Copyright © Manju Suchdeo, Deepak Mawane, Mahek Negandhi, Shipra Sarkar, Shaligram Prajapat . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Manju Suchdeo, Deepak Mawane, Mahek Negandhi, Shipra Sarkar, Shaligram Prajapat, “Towards Performance Analysis of Symmetric Key Algorithm on n-Core Systems: An IOT Perspective,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1127-1129, 2018.
MLA Style Citation: Manju Suchdeo, Deepak Mawane, Mahek Negandhi, Shipra Sarkar, Shaligram Prajapat "Towards Performance Analysis of Symmetric Key Algorithm on n-Core Systems: An IOT Perspective." International Journal of Computer Sciences and Engineering 6.6 (2018): 1127-1129.
APA Style Citation: Manju Suchdeo, Deepak Mawane, Mahek Negandhi, Shipra Sarkar, Shaligram Prajapat, (2018). Towards Performance Analysis of Symmetric Key Algorithm on n-Core Systems: An IOT Perspective. International Journal of Computer Sciences and Engineering, 6(6), 1127-1129.
BibTex Style Citation:
@article{Suchdeo_2018,
author = {Manju Suchdeo, Deepak Mawane, Mahek Negandhi, Shipra Sarkar, Shaligram Prajapat},
title = {Towards Performance Analysis of Symmetric Key Algorithm on n-Core Systems: An IOT Perspective},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1127-1129},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2314},
doi = {https://doi.org/10.26438/ijcse/v6i6.11271129}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.11271129}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2314
TI - Towards Performance Analysis of Symmetric Key Algorithm on n-Core Systems: An IOT Perspective
T2 - International Journal of Computer Sciences and Engineering
AU - Manju Suchdeo, Deepak Mawane, Mahek Negandhi, Shipra Sarkar, Shaligram Prajapat
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1127-1129
IS - 6
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
714 | 368 downloads | 202 downloads |
Abstract
Several Symmetric Key based algorithms exist for securing data of big size. In Order to investigate the efficient one , performance analysis is often desirable activity over variety of parameters including number of cores or processors. In present work one symmetric key algorithm has been considered for analysis for n=1( Serially) and (n =2) for Parallel analysis, (where n is number of core). The relative gain of serial implementation and tested for efficiency indicates that encryption of data chunks in parallel is the for blowfish algorithm. The findings in this study provides a useful direction to users and designers of low power handheld devices and IOT to exploit faster encryption and decryption of data with more number of cores.
Key-Words / Index Term
Symmetric Key Cryptography, Blowfish , parallel implementation
References
[1] D. Miorandi, S. Sicari, F. D. Pellegrini, I. Chlamtac, Internet of things: Vision, applications and research challenges, Ad Hoc Networks 10 (7) (2012) 1497.
[2] E. Isa, N. Sklavos, “Smart Home Automation: GSM Security System Design and Implementation”, proceedings of the 3rd Conference on Electronics and Telecommunications (PACET’15), Ioannina, Greece, May 8-9, 2015.
[3] M. Katsaiti, A. Rigas, I. Tzemos, N. Sklavos, “Real-World Attacks Toward Circuits & Systems Design, Targeting Safety Invasion”, proceedings of the International Conference on Modern Circuits and Systems Technologies (MOCAST’15), Thessaloniki, Greece, May 14-15, 2015.
[4] N. Sklavos, P. Souras, “Economic Models and Approaches in Information Security for Computer Networks”, International Journal of Network Security (IJNS), Science Publications, Vol. 2, No 1, Issue: January, pp. 14-20, 2006.
[5] S. Gusmeroli, S. Piccione, D. Rotondi, “A capability-based security approach to manage access control in the internet of things”, Mathematical and Computer Modelling 58 (5) (2013) 1189.
[6] Kiev Gama, Lionel Touseau, Didier Donsez, “Combining heterogeneous service technologies for building an Internet of Things middleware”, Computer Communications, Volume 35, Issue 4, 15 February 2012, Pages 405-417, ISSN 0140-3664.
[7] R. Roman, J. Zhou, J. Lopez, “On the features and challenges of security and privacy in distributed internet of things”, Computer Networks 57 (10) (2013).
[8] N. Sklavos, R. Chaves, F. Regazzoni, Wireless-SoC-Security: “FPGA Based System-On-A-Chip Security Schemes for 4G & 5G”, Tutorial, 11th HiPEAC Conference 2016 (HiPEAC’16), Prague, Czech Republic, January 18-20, 2016.
[9] N. Sklavos, “Securing Communication Devices via Physical Unclonable Functions (PUFs)”, Information Security Solutions Europe (isse’13), Brussels, 22-23 October, Belgium, 2013, pp. 253-261, Springer, ISBN: 978-3-658-03370-5
[10]http://circuitcellar.com/cc-blog/light-weight-data-encryption-for-iot-and-m2m-applications).
[11] Peter Mell and Timothy Grance, ‘The NIST Definition of Cloud Computing’ Special Publication 800-145, Jan. 2011.
[12] Shakeeba S. Khan, Prof. R.R. Tuteja, ‘Security in Cloud Computing using Cryptographic Algorithms’ International Journal of Innovative Research in Computer and Communication Engineering , Jan. 2015 , ISSN (Print): 2320-9798 Vol. 3, Issue 1.
[13] Er. Ashima Pansotra and Er. Simar Preet Singh, ‘Cloud Security Algorithms’ International Journal of Security and Its Applications , 2015 , Vol.9, No.10 , pp.353-360.
[14] Ako Muhamad Abdullah, ‘Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data’, June 16, 2017.
[15] B. Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), In proc. Cambridge Security Workshop, 191204 ,1993.
[16] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, New York, 1996.
[17] Soufiane Oukili and Seddik Bri, ‘High Throughput Parallel Implementation of Blowfish Algorithm’ Applied Mathematics & Information Sciences No. 6, 2087-2092 2016
[18] B. Schneier, `The Blowfish Encryption Algorithm`. ‘https://www.schneier.com/academic/blowfish/ .
[19] Shaligram Prajapat , Ramjeevan Singh Thakur, "Cryptic Mining for Automatic Variable Key Based Cryptosystem", Procedia Computer Scienc , Volume 78, PP.199-209,2016,https://doi.org/10.1016/j.procs.2016.02.034
[20] Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, IEEE 2016 Symposium on Colossal Data Analysis and Networking (CDAN), pp.1-5, Mar, 2016. DOI: dx.doi.org/10.1109/CDAN.2016.7570921
[21] Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Exploration of Efficient Symmetric Algorithms”, IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)”, pp.663-666, March, 2016, DOI: http://www.dx.doi.org/10.13140/RG.2.2.22077.05607