download0 view1,203
twitter facebook

공공누리This item is licensed Korea Open Government License

dc.contributor.author
윤준원
dc.contributor.author
유헌창
dc.contributor.author
김기봉
dc.contributor.author
박찬열
dc.contributor.author
최장원
dc.contributor.author
홍태영
dc.date.accessioned
2019-08-28T07:42:15Z
dc.date.available
2019-08-28T07:42:15Z
dc.date.issued
2018-10-01
dc.identifier.issn
1936-6442
dc.identifier.uri
https://repository.kisti.re.kr/handle/10580/14745
dc.identifier.uri
http://www.ndsl.kr/ndsl/search/detail/article/articleSearchResultDetail.do?cn=NART90646171
dc.description.abstract
Over the years, parallel computingmodels have been proposed to solve large-scale application problems. P2P and cloud computing are well-known distributed computing models and have the advantage of running and implementing the parallel computing. Applying the
advantages of both models can enhance the benefits of parallel computing. In this paper, we analyze the efficiency of key search algorithm by combining P2P and cloud computing. For our experiment,we apply the key search algorithmin the field of cryptography.
The length of the key, which is stable criterion of cryptographic algorithm, is judged according to the amount of exhaustive key search.
And the key space required for the whole investigation is easy to divide and is very appropriate for parallel calculation of P2P environment. In addition, cloud computing can provide the fitting environment to meet the various user requirements using
virtualization technology. We conduct the following two performance experiments with P2P and cloud computing. First, we propose the method to guarantee the performance in P2P environment based on virtualization. Next, we simulate the performance of the
suggested encryption method in the aforementioned system environment. Results reveal effectiveness and validity of the proposed system environment, which can also provide both scalability and flexibility.
dc.language
eng
dc.relation.ispartofseries
Peer-to-Peer Networking and Applications
dc.title
Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers
dc.citation.endPage
1216
dc.citation.number
6
dc.citation.startPage
1206
dc.citation.volume
11
dc.subject.keyword
P2P computing
dc.subject.keyword
Cloud computing
dc.subject.keyword
Virtualization
dc.subject.keyword
Block cipher
dc.subject.keyword
DES
Appears in Collections:
7. KISTI 연구성과 > 학술지 발표논문
Files in This Item:
There are no files associated with this item.

Browse