Searching RC5 keyspaces with distributed reconfigurable hardware

被引:0
|
作者
Morrison, JP [1 ]
O'Dowd, PJ [1 ]
Healy, PD [1 ]
机构
[1] Natl Univ Ireland Univ Coll Cork, Dept Comp Sci, Cork, Ireland
来源
ERSA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ENGINEERING OF RECONFIGURABLE SYSTEMS AND ALGORITHMS | 2003年
关键词
reconfigurable computing; high performance computing; distributed reconfigurable computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Topic Area: Software. Implementation details and performance measurements for a brute-force RC5 keycrack application executing on a cluster containing commodity reconfigurable hardware are presented. The purpose of the application is to gauge the maximum real-world speedups attainable on a metacomputer that forms the underlying execution platform. The operation of the metacomputer and its associated tools, designed to target cluster-based distributed reconfigurable hardware in a high-level manner, is discussed in detail.
引用
收藏
页码:269 / 272
页数:4
相关论文
共 50 条
  • [41] Towards Complete SAT-based Cryptanalysis of RC5 Cipher
    Sobon, Artur
    Kurkowski, Miroslaw
    Stachowiak, Sylwia
    2019 IEEE 15TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS (INFORMATICS 2019), 2019, : 397 - 402
  • [42] Selection of Parameter 'r' in RC5 Algorithm on the basis of Prime Number
    Gill, Harsimranjit Singh
    2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [43] RC5 CAST Blowfish加密算法简介及比较
    刘雅筠
    宁矿凤
    科技信息, 2009, (14) : 196 - 198
  • [44] Low-speed Wireless Networks Research and Simulation Based on RC5
    Fan, Chou
    Tan, Jin
    Zheng, Peng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4521 - 4524
  • [45] Encryption quality analysis of the RC5 block cipher algorithm for digital images
    Ahmed, Hossam El-din H.
    Kalash, Hamdy M.
    Allah, Osama S. Farag
    OPTICAL ENGINEERING, 2006, 45 (10)
  • [46] Effect of loop-unrolling in hardware reconfigurable implementations of RC5-192 encryption algorithm
    Elkeelany, Omar
    Nimmagadda, Suman
    2008 IEEE REGION 5 CONFERENCE, 2008, : 212 - +
  • [47] Image Encryption Based on Multi-Level Keys on RC5 Algorithm
    Jamil A.S.
    Rahma A.M.S.
    International Journal of Interactive Mobile Technologies, 2022, 16 (17): : 101 - 115
  • [48] 对RC5加密算法的差分分析
    刘胜利
    王育民
    通信保密, 1998, (03) : 63 - 68
  • [49] 浅谈RC5切丝机主要工艺参数的优化
    周海华
    樊盛炯
    自动化应用, 2018, (02) : 32 - 35
  • [50] Design space exploration for distributed hardware reconfigurable systems
    Haubelt, C
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 1171 - 1171