2019
DOI: 10.5121/ijnsa.2019.11104
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer

Abstract: Distributed security is an evolving sub-domain of information and network security. Security applications play a serious role when data exchanging, different volumes of data should be transferred from one site to another safely and at high speed. In this paper, the parallel International Data Encryption Algorithm (IDEA) which is one of the security applications is implemented and evaluated in terms of running time, speedup, and efficiency. The parallel IDEA has been implemented using message passing interface … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Therefore, the exchange of information and data authentication in the IoT system is only done via the central server, connecting to cloud servers via the Internet, thus leading to security and privacy concerns especially with the growing number of IoT devices that will be used by 2025 [1][2][3] [15]. The third trusted party (central server) which guarantees safe and secure delivery between two parties is questionable in case of modifying the original data, delays in delivery, fraud, or vulnerable to system failures and hacking [4] [14][34] [35] [36], because with just a single point of control responsible for security many questions arise such as what if this third party becomes untrusted in terms of that the data may be updated or the system can be a victim of considerable hacked by cybercriminals [5] [6][7] [12]13]. Other questions can arise such as can we use the p2p communication paradigm to tackle the delay in communication as well as the issue of authentication of transactions.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the exchange of information and data authentication in the IoT system is only done via the central server, connecting to cloud servers via the Internet, thus leading to security and privacy concerns especially with the growing number of IoT devices that will be used by 2025 [1][2][3] [15]. The third trusted party (central server) which guarantees safe and secure delivery between two parties is questionable in case of modifying the original data, delays in delivery, fraud, or vulnerable to system failures and hacking [4] [14][34] [35] [36], because with just a single point of control responsible for security many questions arise such as what if this third party becomes untrusted in terms of that the data may be updated or the system can be a victim of considerable hacked by cybercriminals [5] [6][7] [12]13]. Other questions can arise such as can we use the p2p communication paradigm to tackle the delay in communication as well as the issue of authentication of transactions.…”
Section: Introductionmentioning
confidence: 99%