Distributed Rc5 Decryption as a Consumer for Idle-time Brokerage
نویسنده
چکیده
RSA Data Security, Inc. is sponsoring contests to prove the (in-)security of miscellaneous cryptographic algorithms as DES or RC5. We have joined RSA’s RC5 contest by combining idle CPU power from users visiting a web site. Via an embedded Java RC5 applet down-loading and testing RC5 keys from the web server it was originating from, visitors can participate and donate idle CPU cycles without hassle for the secret key contests. This example of distributed computing with Java applets served as a base to further explore the possibilities Java is offering for the brokerage of idle CPU resources on the Internet. Our new concept – provider orientation, low overhead, working incentives and new, modest applications – solves deficiencies of related full-grown, user-oriented distributed computing environments and gives way to a propagation of an electronic idle-time market focused on the mainstream Internet user as providers of idle computing time.
منابع مشابه
Locust - A Brokerage System for Accessing Idle Ressources for Web-Computing
In this paper we present a brokerage system for making idle cpu ressources of anonymous users of the World Wide Web accessble for distributed Web-Computing. The Locust (LOw cost Computing Utilizing Skimmed idle Time) Broker collects and remarkets the aggregated ressources by means of ubiquitious Web and Java technologies and creates an electronic spot market focused on the mainstream Internet u...
متن کاملSearching RC5-Keys with Distributed Reconfigurable Computing
Distributed Computing projects such as SETI@home or distributed.net have demonstrated how supercomputer performance can be achieved by the use of thousands of linked computers contributing their idle time. The goal of this paper is to combine traditional Distributed Computing concepts with reconfigurable hardware, where free resource area can be used to achive computation speed-ups. Our approac...
متن کاملThe RC5 Encryption Algorithm
This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-length secret key. The encryption and decryption algorithms are exceptionally simple.
متن کاملPerformance Analysis of RC5, Blowfish and DES Block Cipher Algorithms
In this paper, Performance analysis of RC5, Blowfish and DES block cipher algorithms have been done on the basis of execution time and resource utilization. CPU utilization and memory utilization both are considered for determining resource utilization. These three algorithms are parameterized algorithm and encrypt two w-bits at a time. Allowable choices for w are 16 bits, 32 bits, and 64 bits....
متن کاملBudgetary Constraints and Idle Time Allocation in Common-Cycle Production with non-zero Setup Time
Economic lot size scheduling problem (ELSP) for a multi-product single machine system is a classical problem. This paper considers ELSP with budgetary constraint as an important aspect of such systems. In the real world situations the available funds for investment in inventory is limited. By adopting the common cycle time approach to ELSP, we obtain the optimal common cycle which minimizes the...
متن کامل