Comparative Analysis of Energy Cost of Sequential and Parallel Cryptographic Algorithms on Different Platforms
DOI:
https://doi.org/10.55524/Keywords:
Energy Cost, Symmetric Algorithms, Green Computing, EnergyAbstract
Cell phones, smart cards, and health monitoring gadgets are just a few examples of the numerous battery-powered embedded systems utilized to access, alter, and store sensitive and complicated data today. Users are concerned about the protection of their identity credentials, their software packages, and their information. These systems make considerable use of cryptographic algorithms to implement security measures. Many cryptographic algorithms do calculations that are hard to compute and waste a huge amount of energy as a result. In this study, the energy consumption of serial and parallel cryptography algorithms is analyzed. Using an eight-core parallel system and Joule metre (Microsoft's Research Tool), we were able to reduce energy consumption in comparison to sequential algorithms with promising results. The study says that low-frequency symmetric multiprocessors have shown promising results and can make a big difference in green computing, which would be good for society as a whole.
Downloads
References
G.N, P.K, Performance Enhancement of Blowfish Algorithm by Modifying its function. In:Innovative Algorithms and Techniques, Industrial Electronics and Telecommunications, pp. 241-244, 2007.
Kapoor B.,Verma S., Power Management Design and Verification, Journal of Low Power Electronics, Vol. 7, pp. 41- 48, 2011.
RifaPous H., Herrera-Joancomartí J, Computational and energy costs of cryptographic algorithms on handheld devices. Future internetVol. 3, 31-48,2011.
Fei, X., Li, K., Yang, W. and Li, K., 2020. Analysis of energy efficiency of a parallel AES algorithm for CPU-GPU heterogeneous platforms. Parallel Computing, 94, p.102621.
Korthikanti VA., Agha G, Analysis of parallel algorithms for energy conservation in scalable multicore architectures, Proceedings of the IEEE International Conference on Parallel Processing, pp. 212-219, 2009 .
Chandrakasan AP,Brodersen RW, Minimizing power consumption in digital CMOS circuits, Proceedings of the IEEE international Conference, pp. 498-523,1995.
Mani K,Jee B, On the Edge: A Comprehensive Guide to Blade Server Technology, 1st edition, John Wiley & Sons2007. [8] Schneier B., Description of a new variable-length key, 64-bit block cipher (Blowfish), In Fast Software Encryption, pp. 191- 204, 1994.
Schneier B., Applied cryptography: protocols, algorithms, and source code in C, Wiley, 2008.
Paul S,Preneel B., A New Weakness in the RC4 Keystream Generator and an Approach toImprove the Security of the Cipher, Fast Software Encryption, pp. 245-259,2004.
Handa D.,Kapoor B., PARC4: High performance implementation of RC4 cryptographic algorithm using parallelism,Proceedings of IEEE International Conference on Optimization, Reliabilty, and Information Technology (ICROIT), pp. 286-289,2014.
Fluhrer S, Mantin I, Shamir A., Weaknesses in the key scheduling algorithm of RC4. In International Workshop on Selected Areas in Cryptography, pp. 1-24,2001.
Handa D, Kapoor B.,PARC4-I: Parallel Implementation of Enhanced Rc4a Using Pascs And Loop Unrolling Mechanism. Computer Applications: An International Journal (CAIJ), Vol. 2 2015,DOI:10.5121/caij.2015.2203. 25.
Handa D, Kapoor B., Performance Analysis of PBlock Algorithm Implemented Using SIMD Model to Attain Parallelism. InEmerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India,Vol. 2, pp. 71-80, 2015.
Bekaroo G, Bokhoree C,Pattinson C, Power Measurement of Computers: Analysis of the Effectiveness of the Software Based Approach,Int. J. Emerg. Technol. Adv. Eng. Vol. 4, 755- 762, 2015.
Sodhro, A.H., Sangaiah, A.K., Sodhro, G.H., Sekhari, A., Ouzrout, Y. and Pirbhulal, S., 2018. Energy-Efficiency of Tools and Applications on Internet. In Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications (pp. 297-318). Academic Press.
Dubrova, E., 2018. Energy-efficient cryptographic primitives. Facta Universitatis, Series: Electronics and Energetics, 31(2), pp.157-167.