Distributed Rc5 Decryption as a Consumer for Idle-time Brokerage

نویسنده

  • MICHAEL MAY
چکیده

RSA Data Security, Inc. is sponsoring contests to prove the (in-)security of miscellaneous cryptographic algorithms as DES or RC5. We have joined RSA’s RC5 contest by combining idle CPU power from users visiting a web site. Via an embedded Java RC5 applet down-loading and testing RC5 keys from the web server it was originating from, visitors can participate and donate idle CPU cycles without hassle for the secret key contests. This example of distributed computing with Java applets served as a base to further explore the possibilities Java is offering for the brokerage of idle CPU resources on the Internet. Our new concept – provider orientation, low overhead, working incentives and new, modest applications – solves deficiencies of related full-grown, user-oriented distributed computing environments and gives way to a propagation of an electronic idle-time market focused on the mainstream Internet user as providers of idle computing time.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Locust - A Brokerage System for Accessing Idle Ressources for Web-Computing

In this paper we present a brokerage system for making idle cpu ressources of anonymous users of the World Wide Web accessble for distributed Web-Computing. The Locust (LOw cost Computing Utilizing Skimmed idle Time) Broker collects and remarkets the aggregated ressources by means of ubiquitious Web and Java technologies and creates an electronic spot market focused on the mainstream Internet u...

متن کامل

Searching RC5-Keys with Distributed Reconfigurable Computing

Distributed Computing projects such as SETI@home or distributed.net have demonstrated how supercomputer performance can be achieved by the use of thousands of linked computers contributing their idle time. The goal of this paper is to combine traditional Distributed Computing concepts with reconfigurable hardware, where free resource area can be used to achive computation speed-ups. Our approac...

متن کامل

The RC5 Encryption Algorithm

This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-length secret key. The encryption and decryption algorithms are exceptionally simple.

متن کامل

Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms

In this paper, Performance analysis of RC5, Blowfish and DES block cipher algorithms have been done on the basis of execution time and resource utilization. CPU utilization and memory utilization both are considered for determining resource utilization. These three algorithms are parameterized algorithm and encrypt two w-bits at a time. Allowable choices for w are 16 bits, 32 bits, and 64 bits....

متن کامل

Budgetary Constraints and Idle Time Allocation in Common-Cycle Production with non-zero Setup Time

Economic lot size scheduling problem (ELSP) for a multi-product single machine system is a classical problem. This paper considers ELSP with budgetary constraint as an important aspect of such systems. In the real world situations the available funds for investment in inventory is limited. By adopting the common cycle time approach to ELSP, we obtain the optimal common cycle which minimizes the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007