New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism

نویسندگان

  • Mohamed Rasslan
  • Ghada F. El-Kabbany
  • Heba Kamal Aslan
چکیده

Public key cryptosystems depend on complex and time consuming arithmetic operations. Public key cryptosystems require modular operations over large numbers or finite fields. Researchers are working on improving the performance of asymmetric cryptosystems while maintaining the security of the cryptographic algorithms. Parallel computing is the most promising solution to improve the computing power and speed-up these arithmetic operations. In this paper, we propose a generic model to execute any encryption algorithm through a parallelpipelined design. The proposed design is twofold. First, we make use of a number of processors to execute different encryption/decryption steps in parallel. Secondly, complex arithmetic operations could be divided into small simple arithmetic operations that are executed in parallel. Simulation experiments show that parallel implementations of the aggregated signcryption protocol (as a case study) outperforms the sequential performance. The average values of improvement ranges from 47.5% to 80.4% for different number of processors.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the Thermal Characteristics of Semiconductor Lasers Using a New Asymmetric Waveguide Structure

   Self-heating leads to a temperature rise of the laser diode and limits the output power and efficiency due to increased loss and decreased differential gain. To control device self-heating, it is required to design the laser structure with a low optical loss, while the heat flux must spread out of the device efficiently. In this study, a new asymmetric waveguide design is proposed and th...

متن کامل

A Study of the Role of Repetition of Music in the Nimayee Poems of Akhavan Sales

In this article, the aim of the authors is to study the role of repetition in creating music and parallelism in Nimayee poems in the three collections of poems by Mehdi Akhavan Sales: Zamestan, Akhere Shahname and Az Avesta. Accordingly, the researchers have investigated the various manners of repetition in creating parallelism in the poems at three levels: phonological parallelism, lexical par...

متن کامل

Conduction and Dead-Time Voltage Drops Estimation of Asymmetric Cascaded H-Bridge Converters Utilizing Level-Shifted PWM Scheme

Linear AC power supplies can be replaced by their nonlinear switching counterparts due to the lower voltage drops and higher efficiency and power density of switching-mode inverters. Multilevel cascaded H-bridge (CHB) converters are the preferred inverter structure because of modular configuration, control, and protection. The output voltage quality in CHB converters depends on the number of ou...

متن کامل

Two Generic Constructions of Probabilistic Cryptosystems and Their Applications

In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes, among others, the Paillier cryptosystem, and then, another scheme, built from a deterministic trapdoor function. Both schemes are proved semantically secure against chosen plaintext attacks in the standard security m...

متن کامل

Two Important Issues Relevant to Torsional Response of Asymmetric 8-Story RC BuildingDesigned with Direct Displacement based Design Approach

Direct displacement based design (DDBD) is a conceptual framework that directly design a structure to achieve an expected performance level under specified seismic intensity. In this study, two important issues relevant to torsional response of mass eccentric 8-story RC building designed with DDBD approach are investigated. These issues are including the effects of unbalanced mass distribution ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2018