Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yoon, JunWeon | - |
dc.contributor.author | Hong, TaeYoung | - |
dc.contributor.author | Choi, JangWon | - |
dc.contributor.author | Park, ChanYeol | - |
dc.contributor.author | Kim, KiBong | - |
dc.contributor.author | Yu, HeonChang | - |
dc.date.accessioned | 2021-09-02T04:18:29Z | - |
dc.date.available | 2021-09-02T04:18:29Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2018-11 | - |
dc.identifier.issn | 1936-6442 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/72016 | - |
dc.description.abstract | Over the years, parallel computing models have been proposed to solve large-scale application problems. P2P and cloud computing are well-known distributed computing models and have the advantage of running and implementing the parallel computing. Applying the advantages of both models can enhance the benefits of parallel computing. In this paper, we analyze the efficiency of key search algorithm by combining P2P and cloud computing. For our experiment, we apply the key search algorithm in the field of cryptography. The length of the key, which is stable criterion of cryptographic algorithm, is judged according to the amount of exhaustive key search. And the key space required for the whole investigation is easy to divide and is very appropriate for parallel calculation of P2P environment. In addition, cloud computing can provide the fitting environment to meet the various user requirements using virtualization technology. We conduct the following two performance experiments with P2P and cloud computing. First, we propose the method to guarantee the performance in P2P environment based on virtualization. Next, we simulate the performance of the suggested encryption method in the aforementioned system environment. Results reveal effectiveness and validity of the proposed system environment, which can also provide both scalability and flexibility. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Yu, HeonChang | - |
dc.identifier.doi | 10.1007/s12083-018-0641-5 | - |
dc.identifier.scopusid | 2-s2.0-85044443797 | - |
dc.identifier.wosid | 000442240500007 | - |
dc.identifier.bibliographicCitation | PEER-TO-PEER NETWORKING AND APPLICATIONS, v.11, no.6, pp.1206 - 1216 | - |
dc.relation.isPartOf | PEER-TO-PEER NETWORKING AND APPLICATIONS | - |
dc.citation.title | PEER-TO-PEER NETWORKING AND APPLICATIONS | - |
dc.citation.volume | 11 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 1206 | - |
dc.citation.endPage | 1216 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | P2P computing | - |
dc.subject.keywordAuthor | Cloud computing | - |
dc.subject.keywordAuthor | Virtualization | - |
dc.subject.keywordAuthor | Block cipher | - |
dc.subject.keywordAuthor | DES | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.