Searching RC5 keyspaces with distributed reconfigurable hardware

被引:0
|
作者
Morrison, JP [1 ]
O'Dowd, PJ [1 ]
Healy, PD [1 ]
机构
[1] Natl Univ Ireland Univ Coll Cork, Dept Comp Sci, Cork, Ireland
来源
ERSA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ENGINEERING OF RECONFIGURABLE SYSTEMS AND ALGORITHMS | 2003年
关键词
reconfigurable computing; high performance computing; distributed reconfigurable computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Topic Area: Software. Implementation details and performance measurements for a brute-force RC5 keycrack application executing on a cluster containing commodity reconfigurable hardware are presented. The purpose of the application is to gauge the maximum real-world speedups attainable on a metacomputer that forms the underlying execution platform. The operation of the metacomputer and its associated tools, designed to target cluster-based distributed reconfigurable hardware in a high-level manner, is discussed in detail.
引用
收藏
页码:269 / 272
页数:4
相关论文
共 50 条
  • [31] Digital Image Encryption Based on the RC5 Block Cipher Algorithm
    Faragallah, Osama S.
    SENSING AND IMAGING, 2011, 12 (3-4): : 73 - 94
  • [32] Efficient modified RC5 based on chaos adapted to image encryption
    Amin, Mohamed
    Abd El-Latif, Ahmed A.
    JOURNAL OF ELECTRONIC IMAGING, 2010, 19 (01)
  • [33] Basic OS support for distributed reconfigurable hardware
    Haubelt, C
    Koch, D
    Teich, J
    COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2004, 3133 : 30 - 38
  • [34] Low Power RC5 Cipher for ZigBee Portable Biomedical Systems
    Lin, Yain-Reu
    Hsu, Chia-Hao
    Rieger, R.
    Wang, Chua-Chin
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 615 - 616
  • [35] Cost-Effective Architectures for RC5 Brute Force Cracking
    Bucek, J.
    Hlavac, J.
    Matuskova, M.
    Lorencz, R.
    ACTA POLYTECHNICA, 2005, 45 (02) : 61 - 66
  • [36] Improving Stored Data Security In Cloud Using Rc5 Algorithm
    Singh, Jay
    Kumar, Brajesh
    Khatri, Asha
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [37] Area optimized architecture and VLSI implementation of RC5 encryption algorithm
    Sklavos, N
    Machas, C
    Koufopavlou, O
    ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 172 - 175
  • [38] RC5加解密算法的C#实现
    朱明海
    电脑编程技巧与维护, 2005, (06) : 84 - 86
  • [39] Negligible Time-consuming RC5 Remote Decoding Technique
    Singha, Thockchom Birjit
    Jain, Lakshay
    Kant, Bikash
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [40] ERC5a-An Enhanced RC5 Algorithm on Bit Propagation in the Encryption Function
    Vibar, Jayvee Christopher N.
    Medina, Ruji P.
    Sison, Ariel M.
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 479 - 482