SlideShare a Scribd company logo
1 of 13
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 1
CHAPTER 1
INTRODUCTION
1.1 AIM
To implement and improve the performance of Advanced Encryption Standard algorithm
by using multicore systems and Open MP API extracting as much parallelism as possible from
the algorithm in parallel implementation approach.
1.2 SCOPE
The requirement of information security on a network has become highly challenging.
Cryptography is a method to provide information confidentiality, authenticity and integrity. The
cryptography overcomes several challenges such as execution time, memory requirement, and
computation power. However, one cannot get desired outcomes by using sequential computation.
In this project, the introduction of parallel computation using multicore processors by
parallelizing the execution of the algorithm in multiple cores and also analyze the effectiveness
of the Advanced Encryption Standard (AES) algorithm on dual core processor by using Open
MP API to reduce the execution time. This process is validated using JAVA platform.
1.3 OBJECTIVES
ď‚· To facilitate encryption and decryption of large data.
ď‚· To reduce execution time by using multicore system.
ď‚· To compare the execution time of single core and multicore systems.
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 2
CHAPTER 2
METHODOLOGY
ď‚· The input is a text file consisting of n-blocks of data.
ď‚· The first n/2 blocks can be assigned to one core for encryption/decryption, while another
n/2 blocks can be assigned to another core for performing encryption/decryption.
ď‚· The encryption/decryption on multiple blocks of data is done simultaneously by using the
concept of simultaneous multithreading, some of the blocks by one core and some of the
blocks by another core. This process will continue until the end of the file.
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 3
Explanation of the flowchart
Step 1: The system starts execution.
Step 2: The user will be uploading the large file for the system. The system reads this large file
and stores in the program buffer.
Step 3: The large file will be divided into two equal parts. For example, if the input file is of
1GB, then it will be divided into two parts each with 500MB. In other words, if the input file has
10,000 lines, then the system will be dividing the file into two parts each having 5000 lines.
(Note: The efficiency of the system can even further be improved by dividing the input file into
more than two parts (like 4, 6, or 8 parts in case we have quad core, hexa core, or octa core
processor respectively.)
Step 4: Each of the input parts will be encrypted by an independent CPU core. For instance, first
part of the file will be encrypted by Core 0; second part of the file will be encrypted by core 1,
etc.
Step 5: Output of each CPU cores will be combined to form a single encrypted file.
Step 6: The total time taken from all the above steps are calculated.
Step 7: System stops execution.
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 4
CHAPTER 3
REQUIREMENT ANALYSIS
3.1 Introduction
A requirements specification for a software system is a complete description of the
behavior of a system to be developed. It includes functional requirements and non-functional
requirements. A functional requirement includes a set of use cases that describe all the
interactions the users will have with the software. Use cases are also known as functional
requirements. Non-functional requirements are requirements which impose constraints on the
design or implementation (such as performance engineering requirements, quality standards, or
design constraints).
3.2 Functional Requirements
Functional Requirements are those that refer to the functionality of the system, i.e., what
Services it will provide to the user.
1. User account operation provides the following functionalities with respect to the end
users of the system:
ď‚· Creating a new account.
ď‚· Login to an existing account.
ď‚· Logout from an account.
ď‚· Delete an Account.
ď‚· Change the password.
ď‚· Retrieve the password.
ď‚· Update the profile.
2. The keys component will provide following functionality:
ď‚· Generation of the key.
3. The encryption component will provide following functionalities:
ď‚· Uploading of a text file.
ď‚· Specifying the resultant path after encryption.
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 5
4. The decryption component will provide following functionalities:
ď‚· Uploading the encrypted file.
ď‚· Specifying the resultant path after decryption.
3.3 NONFUNCTIONALREQUIRMENTS
These are requirements that are not functional in nature, that is, these are constraints within
which the system must work.
Modifiability: The system design should allow modification of the existing functionality of the
application.
Extensibility: The system design of the application must be flexible enough, so that any further
implementations or enhancements are allowed.
Usability: The user must find it very easy to use the application.
Reusability: The system design should contain components or modules and classes which can
be used again to add new functionalities with slight or no modification.
Scalability: The application should function well even if it is changed in size or approach being
used to meet the user needs.
3.4 Input Requirement
ď‚· Input is given by the User as a text file.
3.5 Output Requirement
ď‚· The encryption component gives encrypted file of the input text file. This encrypted file
is fed as input to the decryption component which gives the original input text.
3.6 Hardware Requirements
ď‚· Processor : Intel core 2 Duo processor
ď‚· Hard Disk : 40 GB hard disk
ď‚· RAM : 2 GB RAM
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 6
3.7 Software Requirements
ď‚· Operating System : Windows 7
ď‚· Database : MySQL
ď‚· Language : core Java, advanced Java
ď‚· Development Kit : JDK 1.8
ď‚· Web Server : Apache tomcat 9
ď‚· Development Tool : Eclipse
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 7
CHAPTER 4
SYSTEM DESIGN
4.1 Data Flow Diagram
En
Fig. 4.1: DATA FLOW DIAGRAM
Create
account
Plain text file
Output folder
Identifier
Key
generation
Plain text file
Encrypted file
Output folder
Windows Builder
Plugins
MYSQL
AES-Encryption improved
AES-Decryption improved
Login/
Logout
Edit
Profile
Change
Password
Forgot
Password
Delete
Profile
Encryption
Decryption
Comparison
Keys
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 8
Explanation of the Data Flow Diagram
MySQL database
MySQL database is used for storing the user account information like email, password,
gender, mobile, first name, last name, address, etc.
User Account operation
User account operation provides the following functionalities with respect to the end
users of the system:
ď‚· Create a new account so that the user gets access to our system.
ď‚· Login to an existing account thus creating a new session.
ď‚· Logout from an account after performing various operations within the session.
ď‚· Delete an Account in case the user no longer needs access to the system.
ď‚· Change the password for an existing account.
ď‚· Retrieve the password for an account in email in case the user forgets the password.
ď‚· Update the profile by modifying the values provided during the registration step.
Keys
Using this component, the end user can generate a new Key used for performing
encryption operations by specifying a unique identifier as an input to this component.
Encryption
This component will be used by the end users to upload a new file which must be
encrypted. The user will also specify the path where the resultant file (after encryption) must be
stored. This component communicates the following components:
ď‚· It communicates with the Keys component to retrieve the keys that will be used for
encryption.
ď‚· It also communicates with AES-Encryption-Improved component to invoke the
algorithm.
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 9
Decryption
This component will be used by the end users to upload an encrypted file which must be
decrypted. The user will also specify the path where the resultant file (after decryption) must be
stored. This component communicates the following components:
ď‚· It communicates with the Keys component to retrieve the keys that will be used for
decryption. The keys used for encryption will be the same as the key that will be used for
decryption. Thus, AES is called as Symmetric Encryption.
ď‚· It also communicates with AES-Decryption-Improved component to invoke the inverse
of the algorithm.
AES-Encryption-Improved
This component will have the implementation of the improved encryption AES
algorithm. This component divides the input file into multiple parts and executes each of these
parts on a different CPU cores to achieve concurrency.
AES-Decryption-Improved
This component will have the implementation of the improved decryption AES
algorithm. This component divides the input file into multiple parts and executes each of these
parts on a different CPU cores to achieve concurrency.
Comparison
This component is used for comparing the performance of the proposed system with that
of an existing system. This component accepts a large file as an input and performs encryption
on the file using the proposed system and using existing approach. It records the time taken by
both the systems and outputs the results.
Windows Builder Eclipse Plugin
Windows builder eclipse plugins are the libraries used for developing Java swings and
AWT/SWT components which will be used for developing the frontend screen for the system.
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 10
4.2 Use Case Diagram
Fig. 4.2: Use Case Diagram
Account
operation
Keys
Encryption
Comparison
Decryption
Create account
Delete profile
Login/Logout
Edit profile
Forgot password
Change password
Identifier
Key generation
Plain text file
Output folder
Encrypted file
Output folder
Plain text file
Graph
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 11
CONCLUSION
The concept of parallel programming by using a multi-core processor is described and it
is shown how to efficiently and effectively implement the Advanced Encryption Algorithm by
using multicore systems and open MP API, extracting as much parallelism as possible from the
algorithm in parallel implementation approach. The execution time of the proposed system takes
less time when compare to the existing system for larger text files.
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 12
REFERENCES
[1] M. Nagendra and M. Chandra Sekhar ., “Performance Improvement of Advanced Encryption
Algorithm using Parallel Computation”, International Journal of Software Engineering and Its
Applications.
[2] Supachai Thongsuk1, Prabhas Chongstitvatana., “An implementation of AES algorithm on
multicore processors for high throughput”, Department of Computer Engineering Faculty of
Engineering, Chulalongkorn University Bangkok, Thailand.
[3] Nhat-Phuong Tran, Myungho Lee*, Sigwon Hong., “Parallel Execution of AES-CTR
Algorithm Using Extended Block Size”, Dept of Computer Science and Engineering, Myong Ji
University.
[4] Suresh Sharma, T S B Sudarshan., “Design of an Efficient Architecture for Advanced
Encryption Standard Algorithm Using Systolic Structures”, International Conference of High
Performance Computing.
[5] Sliman Arrag1, Abdellatif Hamdoun 2, Abderrahim Tragha 3 and Salah eddine Khamlich.,
“Design and Implementation A different Architectures of mixcolumn in FPGA”, Department of
Electronics and treatment of information UNIVERSITE HASSAN II MOHAMMEDIA,
Casablanca, Morocco.
[6] Juan C. Pichel, David E. Singh and Jes´us Carretero., “Reordering Algorithms for Increasing
Locality on Multicore Processors”, Computer Science Dpt. Universidad Carlos III de Madrid,
Spain.
ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR
DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 13
Signature of Students:
Chethan B.M. 4BB13CS011 …………………..
Nikhil Jain C.S. 4BB13CS021 …………………..
Sharath M.S. 4BB13CS029 …………………..
Mrs. Kavitha C.R. Mr. Nagaraju S. Mrs. Kavitha C.R.
Asso. Prof. & Guide Asst. Prof. & Coordinator Asso. Prof. & HOD

More Related Content

What's hot

Project report
Project reportProject report
Project reportayush13bbm
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat applicationPiyush Rawat
 
Cisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the examCisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the examle_dung762
 
0index
0index0index
0indexhanmya
 

What's hot (6)

Project report
Project reportProject report
Project report
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat application
 
Oracle soa cloud project
Oracle soa cloud projectOracle soa cloud project
Oracle soa cloud project
 
Session Layer
Session LayerSession Layer
Session Layer
 
Cisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the examCisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the exam
 
0index
0index0index
0index
 

Similar to Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR "

Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Nikhil Jain
 
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Nikhil Jain
 
A two stage feature selection method for text categorization
A two stage feature selection method for text categorizationA two stage feature selection method for text categorization
A two stage feature selection method for text categorizationParag Tamhane
 
Linux Assignment 3
Linux Assignment 3Linux Assignment 3
Linux Assignment 3Diane Allen
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...IEEEGLOBALSOFTTECHNOLOGIES
 
First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...
First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...
First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...Nikhil Jain
 
Co question bank LAKSHMAIAH
Co question bank LAKSHMAIAH Co question bank LAKSHMAIAH
Co question bank LAKSHMAIAH veena babu
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservitychennuruvishnu
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc csPooja Bhojwani
 
9.system analysis
9.system analysis9.system analysis
9.system analysisNARESH DEVOLLA
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxgattamanenitejeswar
 
seed block algorithm
seed block algorithmseed block algorithm
seed block algorithmDipak Badhe
 
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docxCS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docxfaithxdunce63732
 
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfA NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfSaiReddy794166
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Maria Stylianou
 

Similar to Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR " (20)

Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
 
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
 
PID2143641
PID2143641PID2143641
PID2143641
 
A two stage feature selection method for text categorization
A two stage feature selection method for text categorizationA two stage feature selection method for text categorization
A two stage feature selection method for text categorization
 
Linux Assignment 3
Linux Assignment 3Linux Assignment 3
Linux Assignment 3
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based encryption with verifia...
 
First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...
First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...
First phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION...
 
Co question bank LAKSHMAIAH
Co question bank LAKSHMAIAH Co question bank LAKSHMAIAH
Co question bank LAKSHMAIAH
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Amoeba
AmoebaAmoeba
Amoeba
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
9.system analysis
9.system analysis9.system analysis
9.system analysis
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
 
seed block algorithm
seed block algorithmseed block algorithm
seed block algorithm
 
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docxCS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
 
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfA NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...
 

More from Nikhil Jain

Mini Project final report on " LEAKY BUCKET ALGORITHM "
Mini Project final report on " LEAKY BUCKET ALGORITHM "Mini Project final report on " LEAKY BUCKET ALGORITHM "
Mini Project final report on " LEAKY BUCKET ALGORITHM "Nikhil Jain
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...Nikhil Jain
 
Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Nikhil Jain
 
Daknet Abstract ( prepared by me for seminar in my college )
Daknet Abstract ( prepared by me for seminar in my college )Daknet Abstract ( prepared by me for seminar in my college )
Daknet Abstract ( prepared by me for seminar in my college )Nikhil Jain
 
Daknet ppt ( prepared by me for seminar in my college )
Daknet ppt ( prepared by me for seminar in my college )Daknet ppt ( prepared by me for seminar in my college )
Daknet ppt ( prepared by me for seminar in my college )Nikhil Jain
 

More from Nikhil Jain (6)

Mini Project final report on " LEAKY BUCKET ALGORITHM "
Mini Project final report on " LEAKY BUCKET ALGORITHM "Mini Project final report on " LEAKY BUCKET ALGORITHM "
Mini Project final report on " LEAKY BUCKET ALGORITHM "
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
 
Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)
 
Daknet Abstract ( prepared by me for seminar in my college )
Daknet Abstract ( prepared by me for seminar in my college )Daknet Abstract ( prepared by me for seminar in my college )
Daknet Abstract ( prepared by me for seminar in my college )
 
Daknet ppt ( prepared by me for seminar in my college )
Daknet ppt ( prepared by me for seminar in my college )Daknet ppt ( prepared by me for seminar in my college )
Daknet ppt ( prepared by me for seminar in my college )
 
My resume
My resumeMy resume
My resume
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR "

  • 1. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 1 CHAPTER 1 INTRODUCTION 1.1 AIM To implement and improve the performance of Advanced Encryption Standard algorithm by using multicore systems and Open MP API extracting as much parallelism as possible from the algorithm in parallel implementation approach. 1.2 SCOPE The requirement of information security on a network has become highly challenging. Cryptography is a method to provide information confidentiality, authenticity and integrity. The cryptography overcomes several challenges such as execution time, memory requirement, and computation power. However, one cannot get desired outcomes by using sequential computation. In this project, the introduction of parallel computation using multicore processors by parallelizing the execution of the algorithm in multiple cores and also analyze the effectiveness of the Advanced Encryption Standard (AES) algorithm on dual core processor by using Open MP API to reduce the execution time. This process is validated using JAVA platform. 1.3 OBJECTIVES ď‚· To facilitate encryption and decryption of large data. ď‚· To reduce execution time by using multicore system. ď‚· To compare the execution time of single core and multicore systems.
  • 2. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 2 CHAPTER 2 METHODOLOGY ď‚· The input is a text file consisting of n-blocks of data. ď‚· The first n/2 blocks can be assigned to one core for encryption/decryption, while another n/2 blocks can be assigned to another core for performing encryption/decryption. ď‚· The encryption/decryption on multiple blocks of data is done simultaneously by using the concept of simultaneous multithreading, some of the blocks by one core and some of the blocks by another core. This process will continue until the end of the file.
  • 3. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 3 Explanation of the flowchart Step 1: The system starts execution. Step 2: The user will be uploading the large file for the system. The system reads this large file and stores in the program buffer. Step 3: The large file will be divided into two equal parts. For example, if the input file is of 1GB, then it will be divided into two parts each with 500MB. In other words, if the input file has 10,000 lines, then the system will be dividing the file into two parts each having 5000 lines. (Note: The efficiency of the system can even further be improved by dividing the input file into more than two parts (like 4, 6, or 8 parts in case we have quad core, hexa core, or octa core processor respectively.) Step 4: Each of the input parts will be encrypted by an independent CPU core. For instance, first part of the file will be encrypted by Core 0; second part of the file will be encrypted by core 1, etc. Step 5: Output of each CPU cores will be combined to form a single encrypted file. Step 6: The total time taken from all the above steps are calculated. Step 7: System stops execution.
  • 4. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 4 CHAPTER 3 REQUIREMENT ANALYSIS 3.1 Introduction A requirements specification for a software system is a complete description of the behavior of a system to be developed. It includes functional requirements and non-functional requirements. A functional requirement includes a set of use cases that describe all the interactions the users will have with the software. Use cases are also known as functional requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints). 3.2 Functional Requirements Functional Requirements are those that refer to the functionality of the system, i.e., what Services it will provide to the user. 1. User account operation provides the following functionalities with respect to the end users of the system: ď‚· Creating a new account. ď‚· Login to an existing account. ď‚· Logout from an account. ď‚· Delete an Account. ď‚· Change the password. ď‚· Retrieve the password. ď‚· Update the profile. 2. The keys component will provide following functionality: ď‚· Generation of the key. 3. The encryption component will provide following functionalities: ď‚· Uploading of a text file. ď‚· Specifying the resultant path after encryption.
  • 5. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 5 4. The decryption component will provide following functionalities: ď‚· Uploading the encrypted file. ď‚· Specifying the resultant path after decryption. 3.3 NONFUNCTIONALREQUIRMENTS These are requirements that are not functional in nature, that is, these are constraints within which the system must work. Modifiability: The system design should allow modification of the existing functionality of the application. Extensibility: The system design of the application must be flexible enough, so that any further implementations or enhancements are allowed. Usability: The user must find it very easy to use the application. Reusability: The system design should contain components or modules and classes which can be used again to add new functionalities with slight or no modification. Scalability: The application should function well even if it is changed in size or approach being used to meet the user needs. 3.4 Input Requirement ď‚· Input is given by the User as a text file. 3.5 Output Requirement ď‚· The encryption component gives encrypted file of the input text file. This encrypted file is fed as input to the decryption component which gives the original input text. 3.6 Hardware Requirements ď‚· Processor : Intel core 2 Duo processor ď‚· Hard Disk : 40 GB hard disk ď‚· RAM : 2 GB RAM
  • 6. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 6 3.7 Software Requirements ď‚· Operating System : Windows 7 ď‚· Database : MySQL ď‚· Language : core Java, advanced Java ď‚· Development Kit : JDK 1.8 ď‚· Web Server : Apache tomcat 9 ď‚· Development Tool : Eclipse
  • 7. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 7 CHAPTER 4 SYSTEM DESIGN 4.1 Data Flow Diagram En Fig. 4.1: DATA FLOW DIAGRAM Create account Plain text file Output folder Identifier Key generation Plain text file Encrypted file Output folder Windows Builder Plugins MYSQL AES-Encryption improved AES-Decryption improved Login/ Logout Edit Profile Change Password Forgot Password Delete Profile Encryption Decryption Comparison Keys
  • 8. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 8 Explanation of the Data Flow Diagram MySQL database MySQL database is used for storing the user account information like email, password, gender, mobile, first name, last name, address, etc. User Account operation User account operation provides the following functionalities with respect to the end users of the system: ď‚· Create a new account so that the user gets access to our system. ď‚· Login to an existing account thus creating a new session. ď‚· Logout from an account after performing various operations within the session. ď‚· Delete an Account in case the user no longer needs access to the system. ď‚· Change the password for an existing account. ď‚· Retrieve the password for an account in email in case the user forgets the password. ď‚· Update the profile by modifying the values provided during the registration step. Keys Using this component, the end user can generate a new Key used for performing encryption operations by specifying a unique identifier as an input to this component. Encryption This component will be used by the end users to upload a new file which must be encrypted. The user will also specify the path where the resultant file (after encryption) must be stored. This component communicates the following components: ď‚· It communicates with the Keys component to retrieve the keys that will be used for encryption. ď‚· It also communicates with AES-Encryption-Improved component to invoke the algorithm.
  • 9. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 9 Decryption This component will be used by the end users to upload an encrypted file which must be decrypted. The user will also specify the path where the resultant file (after decryption) must be stored. This component communicates the following components: ď‚· It communicates with the Keys component to retrieve the keys that will be used for decryption. The keys used for encryption will be the same as the key that will be used for decryption. Thus, AES is called as Symmetric Encryption. ď‚· It also communicates with AES-Decryption-Improved component to invoke the inverse of the algorithm. AES-Encryption-Improved This component will have the implementation of the improved encryption AES algorithm. This component divides the input file into multiple parts and executes each of these parts on a different CPU cores to achieve concurrency. AES-Decryption-Improved This component will have the implementation of the improved decryption AES algorithm. This component divides the input file into multiple parts and executes each of these parts on a different CPU cores to achieve concurrency. Comparison This component is used for comparing the performance of the proposed system with that of an existing system. This component accepts a large file as an input and performs encryption on the file using the proposed system and using existing approach. It records the time taken by both the systems and outputs the results. Windows Builder Eclipse Plugin Windows builder eclipse plugins are the libraries used for developing Java swings and AWT/SWT components which will be used for developing the frontend screen for the system.
  • 10. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 10 4.2 Use Case Diagram Fig. 4.2: Use Case Diagram Account operation Keys Encryption Comparison Decryption Create account Delete profile Login/Logout Edit profile Forgot password Change password Identifier Key generation Plain text file Output folder Encrypted file Output folder Plain text file Graph
  • 11. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 11 CONCLUSION The concept of parallel programming by using a multi-core processor is described and it is shown how to efficiently and effectively implement the Advanced Encryption Algorithm by using multicore systems and open MP API, extracting as much parallelism as possible from the algorithm in parallel implementation approach. The execution time of the proposed system takes less time when compare to the existing system for larger text files.
  • 12. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 12 REFERENCES [1] M. Nagendra and M. Chandra Sekhar ., “Performance Improvement of Advanced Encryption Algorithm using Parallel Computation”, International Journal of Software Engineering and Its Applications. [2] Supachai Thongsuk1, Prabhas Chongstitvatana., “An implementation of AES algorithm on multicore processors for high throughput”, Department of Computer Engineering Faculty of Engineering, Chulalongkorn University Bangkok, Thailand. [3] Nhat-Phuong Tran, Myungho Lee*, Sigwon Hong., “Parallel Execution of AES-CTR Algorithm Using Extended Block Size”, Dept of Computer Science and Engineering, Myong Ji University. [4] Suresh Sharma, T S B Sudarshan., “Design of an Efficient Architecture for Advanced Encryption Standard Algorithm Using Systolic Structures”, International Conference of High Performance Computing. [5] Sliman Arrag1, Abdellatif Hamdoun 2, Abderrahim Tragha 3 and Salah eddine Khamlich., “Design and Implementation A different Architectures of mixcolumn in FPGA”, Department of Electronics and treatment of information UNIVERSITE HASSAN II MOHAMMEDIA, Casablanca, Morocco. [6] Juan C. Pichel, David E. Singh and Jes´us Carretero., “Reordering Algorithms for Increasing Locality on Multicore Processors”, Computer Science Dpt. Universidad Carlos III de Madrid, Spain.
  • 13. ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ALGORITHM ON MULTICORE PROCESSOR DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING, BCE, SHRAVANABELAGOLA 13 Signature of Students: Chethan B.M. 4BB13CS011 ………………….. Nikhil Jain C.S. 4BB13CS021 ………………….. Sharath M.S. 4BB13CS029 ………………….. Mrs. Kavitha C.R. Mr. Nagaraju S. Mrs. Kavitha C.R. Asso. Prof. & Guide Asst. Prof. & Coordinator Asso. Prof. & HOD