CFP last date
20 January 2025
Reseach Article

Performance Improvement of Double Data Encryption Standard Algorithm using Parallel Computation

by Amaal Shorman, Mohammad Qatawneh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 25
Year of Publication: 2018
Authors: Amaal Shorman, Mohammad Qatawneh
10.5120/ijca2018916527

Amaal Shorman, Mohammad Qatawneh . Performance Improvement of Double Data Encryption Standard Algorithm using Parallel Computation. International Journal of Computer Applications. 179, 25 ( Mar 2018), 1-6. DOI=10.5120/ijca2018916527

@article{ 10.5120/ijca2018916527,
author = { Amaal Shorman, Mohammad Qatawneh },
title = { Performance Improvement of Double Data Encryption Standard Algorithm using Parallel Computation },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2018 },
volume = { 179 },
number = { 25 },
month = { Mar },
year = { 2018 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number25/29085-2018916527/ },
doi = { 10.5120/ijca2018916527 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:25.260100+05:30
%A Amaal Shorman
%A Mohammad Qatawneh
%T Performance Improvement of Double Data Encryption Standard Algorithm using Parallel Computation
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 25
%P 1-6
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of the applications require information security on network. Cryptography is a method to provide information confidentiality, authenticity, and integrity. Double Data Encryption Standard algorithm (2DES) is used by several applications to protect their information security. However, current implementations of 2DES algorithm suffer from large execution time. Parallel computation is a promising technique to improve the performance of an algorithm. Divide and conquer method is mainly used in parallel computation to solve the algorithm in parallel by partitioning a task into sub-task and allocating them to available processors. In this paper, sequential and parallel 2DES are evaluated and compared in terms of the running time and the speedup. The parallel 2DES algorithm is implemented using Message Passing Interface (MPI) library, and the results have been conducted using IMAN1 supercomputer. Results showed that the run time of parallel 2DES algorithm outperforms the sequential one. Moreover, on a large number of processors, parallel 2DES achieves better parallel efficiency. Therefore, the parallel 2DES provides much better performance in term of execution time than the serial ones and would be useful to apply it to encrypt and decrypt multimedia.

References
  1. V Beletskyy and D Burak. Parallelization of the data encryption standard (des) algorithm. In Enhanced methods in computer security, biometric and artificial intelligence systems, pages 23–33. Springer, 2005.
  2. Eli Biham. A fast new des implementation in software. In International Workshop on Fast Software Encryption, pages 260–272. Springer, 1997.
  3. Ebru Celikel, Jean Davidson, and Colin Kern. Parallel performance of des in ecb mode. In Computer Networks, 2006 International Symposium on, pages 134–139. IEEE, 2006.
  4. Morris J Dworkin. Recommendation for block cipher modes of operation: Methods and techniques. 2001.
  5. Ananth Grama. Introduction to parallel computing. Pearson Education, 2003.
  6. Atul Kahate. Cryptography and network security. Tata McGraw-Hill Education, 2013.
  7. Hironori Kasahara and Seinosuke Narita. Practical multiprocessor scheduling algorithms for efficient parallel processing. IEEE Trans. Comput.;(United States), 100, 1984.
  8. Mazen KHADDOUR, Zhoukun Wang, and Omar Hammami. Performance evaluation and analysis of parallel software implementations of tdes on a16-peembedded multiprocessor platform. In Network and Service Security, 2009. N2S’09. International Conference on, pages 1–5. IEEE, 2009.
  9. Ross Anderson1 Eli Biham2 Lars Knudsen. Serpent: A proposal for the advanced encryption standard. In First Advanced Encryption Standard (AES) Conference, Ventura, CA, 1998.
  10. Wei Liu, Rong Luo, and Huazhong Yang. Cryptography overhead evaluation and analysis for wireless sensor networks. In Communications and Mobile Computing, 2009. CMC’09. WRI International Conference on, volume 3, pages 496–501. IEEE, 2009.
  11. Wei Liu, Beihua Ying, Huazhong Yang, and HuiWang. Accurate modeling for predicting cryptography overheads on wireless sensor nodes. In Proceedings of the 11th international conference on Advanced Communication Technology-Volume 2, pages 997–1001. IEEE Press, 2009.
  12. IMAN1 Project. Jordan’s national supercompting center. http://www.iman1.jo/iman1/. Accessed: 2017-11-25.
  13. J Quinn Michael. Parallel programming in c with mpi and openmp mcgraw-hill inc. Technical report, ISBN 0-07- 058201-7, 2004.
  14. Rolf Rabenseifner, Georg Hager, and Gabriele Jost. Hybrid mpi/openmp parallel programming on clusters of multi-core smp nodes. In Parallel, Distributed and Network-based Processing, 2009 17th Euromicro International Conference on, pages 427–436. IEEE, 2009.
  15. Ronald L Rivest. Testing implementations of DES. MIT Laboratory for Computer Science, Cambridge, Mass, 1985.
  16. Maha Saadeh, Huda Saadeh, and Mohammad Qatawneh. Performance evaluation of parallel sorting algorithms on iman1 supercomputer. International Journal of Advanced Science and Technology, 95:57–72, 2016.
  17. Bruce Schneier. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.
  18. E Seidel and Joseph N Gregg. Preparing tomorrows cryptography: Parallel computation via multiple processors, vector processing, and multi-cored chips. Senior Honors Project, Lawrence University, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Double Data Encryption Standard MPI Parallel Computation Supercomputer