CFP last date
20 December 2024
Reseach Article

Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer

by Heba Harahsheh, Mohammad Qatawneh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 50
Year of Publication: 2018
Authors: Heba Harahsheh, Mohammad Qatawneh
10.5120/ijca2018916654

Heba Harahsheh, Mohammad Qatawneh . Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer. International Journal of Computer Applications. 179, 50 ( Jun 2018), 1-7. DOI=10.5120/ijca2018916654

@article{ 10.5120/ijca2018916654,
author = { Heba Harahsheh, Mohammad Qatawneh },
title = { Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2018 },
volume = { 179 },
number = { 50 },
month = { Jun },
year = { 2018 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number50/29513-2018916654/ },
doi = { 10.5120/ijca2018916654 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:59:22.110769+05:30
%A Heba Harahsheh
%A Mohammad Qatawneh
%T Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 50
%P 1-7
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now-a-days data is needed to be exchanged through networks in secure manner. Hence for secure communication required cryptography algorithms. Among these algorithms is Twofish cryptographic algorithm. In this paper the Sequential and parallel implementation have been implemented in IMAN1 supercomputer using Message Passing Interface (MPI). The parallel implementation has been evaluated in terms of execution time, speedup, and efficiency. The simulation results show that 256 key lengths in 4 processors get best efficiency up to 37% while 192 and 128 key length achieves up to 33% and 29% in order.

References
  1. M. Saadeh, H. Saadeh and M. Qatawneh, "Performance Evaluation of Parallel Sorting Algorithms on IMAN1 Supercomputer," 2016.
  2. M. Qatawneh , "embedding linear array network into the tree-hypercube network," 2005.
  3. M. Qatawneh, "Multilayer Hex-Cells: A New Class of Hex-Cell Interconnection Networks for Massively Parallel Systems," 2011.
  4. M. Qatawneh, "Embedding Binary Tree and Bus into Hex-Cell Interconnection Network," 2011.
  5. M. Qatawneh and H. Khattab, "New Routing Algorithm for Hex-Cell Network," 2015.
  6. M. Qatawneh, "New Efficient Algorithm for Mapping Linear Array into Hex-Cell Network," 2016.
  7. Aparna, A. K, J. Solomon, H. M and I. V, "A Study of Twofish Algorithm," 2016.
  8. M. S. Saraireh, "A Novel Security Scheme based on Twofish and Discrete Wavelet Transform," 2017.
  9. M. Ebrahim, S. Khan and U. Bin Khalid, "Symmetric Algorithm Survey: A Comparative Analysis," 2013.
  10. R. KAUR and J. SINGH SAINI, "extended twofish block cipher algorithm for 256-bit blocks and performance comparison with twofish," 2014.
  11. P. Chodowiec, P. Khuon and K. Gaj, "Fast Implementations of Secret-Key Block Ciphers Using Mixed Inner- and Outer-Round Pipelining," 2001.
  12. Mushtaque, H. Dhiman, S. Hussain and S. Maheshwari, "Evaluation of DES, TDES, AES, Blowfish and Two fish Encryption Algorithm: Based on Space Complexity," 2014.
  13. H. K. Verma and R. K. Singh, "Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms," 2012.
  14. P. Gehlot, R. Sharma and S. R. Biradar, "VHDL Implementation of Twofish Algorithm".
  15. D. Rane, "Superiority of Twofish over Blowfish," 2016.
  16. S. Lucks, "The Saturation Attack – A Bait for Twofish," 2002.
  17. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall and N. Ferguson, "On the Twofish Key Schedule," 1999.
  18. M. Dener, "Security Analysis in Wireless Sensor Networks," 2014.
  19. P. Gehlot, S. R. Biradar and B. P. Singh, "Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL," 2013.
  20. M. A. Devi and M. R. B. S, "Two fish Algorithm Implementation for lab to provide data security with predictive analysis," 2017.
Index Terms

Computer Science
Information Sciences

Keywords

Twofish Algorithm Parallel Supercomputer MPI.