Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

Jun Weon Yoon, Tae Young Hong, Jang Won Choi, Chan Yeol Park, Ki Bong Kim, Heonchang Yu

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Over the years, parallel computing models have been proposed to solve large-scale application problems. P2P and cloud computing are well-known distributed computing models and have the advantage of running and implementing the parallel computing. Applying the advantages of both models can enhance the benefits of parallel computing. In this paper, we analyze the efficiency of key search algorithm by combining P2P and cloud computing. For our experiment, we apply the key search algorithm in the field of cryptography. The length of the key, which is stable criterion of cryptographic algorithm, is judged according to the amount of exhaustive key search. And the key space required for the whole investigation is easy to divide and is very appropriate for parallel calculation of P2P environment. In addition, cloud computing can provide the fitting environment to meet the various user requirements using virtualization technology. We conduct the following two performance experiments with P2P and cloud computing. First, we propose the method to guarantee the performance in P2P environment based on virtualization. Next, we simulate the performance of the suggested encryption method in the aforementioned system environment. Results reveal effectiveness and validity of the proposed system environment, which can also provide both scalability and flexibility.

Original languageEnglish
Pages (from-to)1-11
Number of pages11
JournalPeer-to-Peer Networking and Applications
DOIs
Publication statusAccepted/In press - 2018 Mar 27

Fingerprint

Cloud computing
Parallel processing systems
Cryptography
Distributed computer systems
Scalability
Experiments
Virtualization

Keywords

  • Block cipher
  • Cloud computing
  • DES
  • P2P computing
  • Virtualization

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Cite this

Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers. / Yoon, Jun Weon; Hong, Tae Young; Choi, Jang Won; Park, Chan Yeol; Kim, Ki Bong; Yu, Heonchang.

In: Peer-to-Peer Networking and Applications, 27.03.2018, p. 1-11.

Research output: Contribution to journalArticle

Yoon, Jun Weon ; Hong, Tae Young ; Choi, Jang Won ; Park, Chan Yeol ; Kim, Ki Bong ; Yu, Heonchang. / Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers. In: Peer-to-Peer Networking and Applications. 2018 ; pp. 1-11.
@article{f41c3bb0a35b456b9c5df81f4fcc86c3,
title = "Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers",
abstract = "Over the years, parallel computing models have been proposed to solve large-scale application problems. P2P and cloud computing are well-known distributed computing models and have the advantage of running and implementing the parallel computing. Applying the advantages of both models can enhance the benefits of parallel computing. In this paper, we analyze the efficiency of key search algorithm by combining P2P and cloud computing. For our experiment, we apply the key search algorithm in the field of cryptography. The length of the key, which is stable criterion of cryptographic algorithm, is judged according to the amount of exhaustive key search. And the key space required for the whole investigation is easy to divide and is very appropriate for parallel calculation of P2P environment. In addition, cloud computing can provide the fitting environment to meet the various user requirements using virtualization technology. We conduct the following two performance experiments with P2P and cloud computing. First, we propose the method to guarantee the performance in P2P environment based on virtualization. Next, we simulate the performance of the suggested encryption method in the aforementioned system environment. Results reveal effectiveness and validity of the proposed system environment, which can also provide both scalability and flexibility.",
keywords = "Block cipher, Cloud computing, DES, P2P computing, Virtualization",
author = "Yoon, {Jun Weon} and Hong, {Tae Young} and Choi, {Jang Won} and Park, {Chan Yeol} and Kim, {Ki Bong} and Heonchang Yu",
year = "2018",
month = "3",
day = "27",
doi = "10.1007/s12083-018-0641-5",
language = "English",
pages = "1--11",
journal = "Peer-to-Peer Networking and Applications",
issn = "1936-6442",
publisher = "Springer New York",

}

TY - JOUR

T1 - Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

AU - Yoon, Jun Weon

AU - Hong, Tae Young

AU - Choi, Jang Won

AU - Park, Chan Yeol

AU - Kim, Ki Bong

AU - Yu, Heonchang

PY - 2018/3/27

Y1 - 2018/3/27

N2 - Over the years, parallel computing models have been proposed to solve large-scale application problems. P2P and cloud computing are well-known distributed computing models and have the advantage of running and implementing the parallel computing. Applying the advantages of both models can enhance the benefits of parallel computing. In this paper, we analyze the efficiency of key search algorithm by combining P2P and cloud computing. For our experiment, we apply the key search algorithm in the field of cryptography. The length of the key, which is stable criterion of cryptographic algorithm, is judged according to the amount of exhaustive key search. And the key space required for the whole investigation is easy to divide and is very appropriate for parallel calculation of P2P environment. In addition, cloud computing can provide the fitting environment to meet the various user requirements using virtualization technology. We conduct the following two performance experiments with P2P and cloud computing. First, we propose the method to guarantee the performance in P2P environment based on virtualization. Next, we simulate the performance of the suggested encryption method in the aforementioned system environment. Results reveal effectiveness and validity of the proposed system environment, which can also provide both scalability and flexibility.

AB - Over the years, parallel computing models have been proposed to solve large-scale application problems. P2P and cloud computing are well-known distributed computing models and have the advantage of running and implementing the parallel computing. Applying the advantages of both models can enhance the benefits of parallel computing. In this paper, we analyze the efficiency of key search algorithm by combining P2P and cloud computing. For our experiment, we apply the key search algorithm in the field of cryptography. The length of the key, which is stable criterion of cryptographic algorithm, is judged according to the amount of exhaustive key search. And the key space required for the whole investigation is easy to divide and is very appropriate for parallel calculation of P2P environment. In addition, cloud computing can provide the fitting environment to meet the various user requirements using virtualization technology. We conduct the following two performance experiments with P2P and cloud computing. First, we propose the method to guarantee the performance in P2P environment based on virtualization. Next, we simulate the performance of the suggested encryption method in the aforementioned system environment. Results reveal effectiveness and validity of the proposed system environment, which can also provide both scalability and flexibility.

KW - Block cipher

KW - Cloud computing

KW - DES

KW - P2P computing

KW - Virtualization

UR - http://www.scopus.com/inward/record.url?scp=85044443797&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85044443797&partnerID=8YFLogxK

U2 - 10.1007/s12083-018-0641-5

DO - 10.1007/s12083-018-0641-5

M3 - Article

AN - SCOPUS:85044443797

SP - 1

EP - 11

JO - Peer-to-Peer Networking and Applications

JF - Peer-to-Peer Networking and Applications

SN - 1936-6442

ER -