TITLE

PERFORMANCE ANALYSIS OF PARALLEL POLLARD'S RHO FACTORING ALGORITHM

AUTHOR(S)
Koundinya, Anjan K.; Harish, G.; Srinath, N. K.; Raghavendra, G. E.; Pramod, Y. V.; Sandeep, R.; Kumar, G. Punith
PUB. DATE
April 2013
SOURCE
International Journal of Computer Science & Information Technolo;Apr2013, Vol. 5 Issue 2, p157
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Integer factorization is one of the vital algorithms discussed as a part of analysis of any black-box cipher suites where the cipher algorithm is based on number theory. The origin of the problem is from Discrete Logarithmic Problem which appears under the analysis of the cryptographic algorithms as seen by a cryptanalyst. The integer factorization algorithm poses a potential in computational science too, obtaining the factors of a very large number is challenging with a limited computing infrastructure. This paper analyses the Pollard's Rho heuristic with a varying input size to evaluate the performance under a multi-core environment and also to estimate the threshold for each computing infrastructure.
ACCESSION #
88086437

 

Related Articles

  • Key Terms in Cryptography. Marshall, Donis // Database & Network Journal;Aug2003, Vol. 33 Issue 4, p6 

    Provides some key terms and phrases in cryptography. Symmetric and asymmetric keys; Initialization vector; Cipher text; Key length; Steps for creating and sending a digital signature with a message.

  • Mixed Messages. Olivastro, Dominic // Sciences;Jan/Feb86, Vol. 26 Issue 1, p62 

    Presents the mechanics of cryptography. Substitution of a letter with another letter; Replacement of the second letter with the penultimate; Technique on making a difficult substitution cipher.

  • Information: Cryptology. Roberts, Larry // Tech Directions;Oct2001, Vol. 61 Issue 3, p11 

    Focuses on the technical uses of cryptology. Application of cryptology in making computer programs; List of methods used in cryptography; Procedures in making a transposition cipher; Details on the use cipher and telegraph in the military service.

  • Play the Spy Game! D'Alto, Nick // Odyssey;Sep2003, Vol. 12 Issue 6, p27 

    Spies use a covert technology called cryptography to code secret messages. Transpositional ciphers — hidden messages made by rearranging letters are used by spies. In order to solve a cipher, a code breaker must first discover its algorithm — the technique or method that was used...

  • Some algebraic aspects of Morse code sequences. Cigler, Johann // Discrete Mathematics & Theoretical Computer Science (DMTCS);Jun2003, Vol. 6 Issue 1, p55 

    Morse code sequences are very useful to give combinatorial interpretations of various properties of Fibonacci numbers. In this note we study some algebraic and combinatorial aspects of Morse code sequences and obtain several q-analogues of Fibonacci numbers and Fibonacci polynomials and their...

  • A Novel Diffusion Approach with Chen's System for Chaotic Image Cryptosystems. Tao Song // International Journal of Advancements in Computing Technology;Nov2012, Vol. 4 Issue 20, p642 

    In last decade, chaos-based image cipher has been widely investigated and a growing number of schemes based on permutation-diffusion architecture have been proposed. In this paper, we propose a new chaotic image cryptosystem by using high dimensional chaotic system in the diffusion stage....

  • Triple SV: A Bit Level Symmetric Block Cipher Having High Avalanche Effect. Chakraborty, Rajdeep; Misra, Sridipta; Khemka, Vineet; Agarwal, Sunit Kr; Agarwal, Sonam; Mandal, J. K. // International Journal of Advanced Computer Science & Application;Jul2011, Vol. 2 Issue 7, p61 

    The prolific growth of network communication system entails high risk of breach in information security. This substantiates the need for higher security for electronic information. Cryptography is one of the ways to secure electronic documents. In this paper, we propose a new block cipher,...

  • A COMPREHENSIVE STUDY OF TIME COMPLEXITY OF VARIOUS ENCRYPTION ALGORITHMS. Singh, Vikendra; Dhiman, Harsh; Khatkar, Manisha; Nida // International Journal of Advances in Engineering & Technology;May2014, Vol. 7 Issue 2, p495 

    As the technology is going to increase, security issues are also going to increase. A secure way of communication and transmission is needed in terms encryption system. So, we need a best encryption algorithm which takes less time complexity. Time complexity refers to CPU time taken to encrypt...

  • A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques. Srikantaswamy, S. G.; Phaneendra, H. D. // International Journal of Computer Applications;Sep2011, Vol. 29, p34 

    Communication is a basic process of exchanging information. Information security is a very important aspect now a day. The introduction of internet and distributed system made the information security issue more challenging and complex. Cryptography plays a crucial role in providing security to...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics