Comparative Analysis of Energy Cost of Sequential and Parallel Cryptographic Algorithms on Different Platforms

Authors

  • Disha Handa Assistant Professor, Department of Computer Science and Engineering,University Institute of Computing, Chandigarh University, Mohali, Punjab, India Author

DOI:

https://doi.org/10.55524/

Keywords:

Energy Cost, Symmetric Algorithms, Green Computing, Energy

Abstract

Cell phones, smart cards, and health  monitoring gadgets are just a few examples of the  numerous battery-powered embedded systems utilized to  access, alter, and store sensitive and complicated data  today. Users are concerned about the protection of their  identity credentials, their software packages, and their  information. These systems make considerable use of  cryptographic algorithms to implement security measures.  Many cryptographic algorithms do calculations that are  hard to compute and waste a huge amount of energy as a  result. In this study, the energy consumption of serial and  parallel cryptography algorithms is analyzed. Using an  eight-core parallel system and Joule metre (Microsoft's  Research Tool), we were able to reduce energy  consumption in comparison to sequential algorithms with  promising results. The study says that low-frequency  symmetric multiprocessors have shown promising results  and can make a big difference in green computing, which  would be good for society as a whole. 

Downloads

Download data is not yet available.

References

G.N, P.K, Performance Enhancement of Blowfish Algorithm by Modifying its function. In:Innovative Algorithms and Techniques, Industrial Electronics and Telecommunications, pp. 241-244, 2007.

Kapoor B.,Verma S., Power Management Design and Verification, Journal of Low Power Electronics, Vol. 7, pp. 41- 48, 2011.

RifaPous H., Herrera-Joancomartí J, Computational and energy costs of cryptographic algorithms on handheld devices. Future internetVol. 3, 31-48,2011.

Fei, X., Li, K., Yang, W. and Li, K., 2020. Analysis of energy efficiency of a parallel AES algorithm for CPU-GPU heterogeneous platforms. Parallel Computing, 94, p.102621.

Korthikanti VA., Agha G, Analysis of parallel algorithms for energy conservation in scalable multicore architectures, Proceedings of the IEEE International Conference on Parallel Processing, pp. 212-219, 2009 .

Chandrakasan AP,Brodersen RW, Minimizing power consumption in digital CMOS circuits, Proceedings of the IEEE international Conference, pp. 498-523,1995.

Mani K,Jee B, On the Edge: A Comprehensive Guide to Blade Server Technology, 1st edition, John Wiley & Sons2007. [8] Schneier B., Description of a new variable-length key, 64-bit block cipher (Blowfish), In Fast Software Encryption, pp. 191- 204, 1994.

Schneier B., Applied cryptography: protocols, algorithms, and source code in C, Wiley, 2008.

Paul S,Preneel B., A New Weakness in the RC4 Keystream Generator and an Approach toImprove the Security of the Cipher, Fast Software Encryption, pp. 245-259,2004.

Handa D.,Kapoor B., PARC4: High performance implementation of RC4 cryptographic algorithm using parallelism,Proceedings of IEEE International Conference on Optimization, Reliabilty, and Information Technology (ICROIT), pp. 286-289,2014.

Fluhrer S, Mantin I, Shamir A., Weaknesses in the key scheduling algorithm of RC4. In International Workshop on Selected Areas in Cryptography, pp. 1-24,2001.

Handa D, Kapoor B.,PARC4-I: Parallel Implementation of Enhanced Rc4a Using Pascs And Loop Unrolling Mechanism. Computer Applications: An International Journal (CAIJ), Vol. 2 2015,DOI:10.5121/caij.2015.2203. 25.

Handa D, Kapoor B., Performance Analysis of PBlock Algorithm Implemented Using SIMD Model to Attain Parallelism. InEmerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India,Vol. 2, pp. 71-80, 2015.

Bekaroo G, Bokhoree C,Pattinson C, Power Measurement of Computers: Analysis of the Effectiveness of the Software Based Approach,Int. J. Emerg. Technol. Adv. Eng. Vol. 4, 755- 762, 2015.

Sodhro, A.H., Sangaiah, A.K., Sodhro, G.H., Sekhari, A., Ouzrout, Y. and Pirbhulal, S., 2018. Energy-Efficiency of Tools and Applications on Internet. In Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications (pp. 297-318). Academic Press.

Dubrova, E., 2018. Energy-efficient cryptographic primitives. Facta Universitatis, Series: Electronics and Energetics, 31(2), pp.157-167.

Downloads

Published

2022-07-30

How to Cite

Comparative Analysis of Energy Cost of Sequential and Parallel Cryptographic Algorithms on Different Platforms . (2022). International Journal of Innovative Research in Computer Science & Technology, 10(4), 142–148. https://doi.org/10.55524/