Searching RC5 keyspaces with distributed reconfigurable hardware

被引:0
|
作者
Morrison, JP [1 ]
O'Dowd, PJ [1 ]
Healy, PD [1 ]
机构
[1] Natl Univ Ireland Univ Coll Cork, Dept Comp Sci, Cork, Ireland
来源
ERSA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ENGINEERING OF RECONFIGURABLE SYSTEMS AND ALGORITHMS | 2003年
关键词
reconfigurable computing; high performance computing; distributed reconfigurable computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Topic Area: Software. Implementation details and performance measurements for a brute-force RC5 keycrack application executing on a cluster containing commodity reconfigurable hardware are presented. The purpose of the application is to gauge the maximum real-world speedups attainable on a metacomputer that forms the underlying execution platform. The operation of the metacomputer and its associated tools, designed to target cluster-based distributed reconfigurable hardware in a high-level manner, is discussed in detail.
引用
收藏
页码:269 / 272
页数:4
相关论文
共 50 条
  • [1] Solving RC5 challenges with hardware - a distributed.net perspective
    De Dormale, Guerric Meurice
    Bass, John
    Quisquater, Jean-Jacques
    2007 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2, 2007, : 642 - 647
  • [2] Performance evaluation of different hardware models of RC5 algorithm
    Elkeelany, Omar
    Nimmagadda, Suman
    PROCEEDINGS OF THE THIRTY-NINTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2007, : 124 - +
  • [3] Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm
    Bertoni, G
    Breveglieri, L
    Koren, I
    Maistri, P
    Piuri, V
    IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, PROCEEDINGS, 2003, : 423 - 432
  • [4] THE RC5 ENCRYPTION ALGORITHM
    RIVEST, RL
    DR DOBBS JOURNAL, 1995, 20 (01): : 146 - &
  • [5] A timing attack on RC5
    Handschuh, H
    Heys, HM
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 306 - 318
  • [6] Differential cryptanalysis of RC5
    Knudsen, LR
    Meier, W
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1997, 8 (05): : 445 - 454
  • [7] Improved cryptanalysis of RC5
    Biryukov, A
    Kushilevitz, E
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 85 - 99
  • [8] 从RC5到RC6
    姜浩
    信息安全与通信保密, 2006, (10) : 49 - 50+54
  • [9] Linearly weak keys of RC5
    Heys, HM
    ELECTRONICS LETTERS, 1997, 33 (10) : 836 - 838
  • [10] Linear cryptanalysis of RC5 and RC6
    Borst, J
    Preneel, B
    Vandewalle, J
    FAST SOFTWARE ENCRYPTION, 1999, 1636 : 16 - 30