SlideShare a Scribd company logo
1 of 18
Presentation
On
An Efficient Parallel Algorithm for
Secured Data
Communication Using RSA Public Key
Cryptography Method
Presented by: Harshal Solao
Outline
• Introduction
• Motivation
• Literature Review
• Mathematical Model
• RSA Algorithm with Example
• Parallelization of RSA
• Methodology
• Advantages and Limitations
• Application
• Conclusion
• Future Scope
• References
Introduction
• The need of spectrum is increasing
exponentially in wireless networking due to
increasing demand for new wireless services
and application.
• Routing is challenging problem due to fitful
availability of Spectrum and incomplete
knowledge of environment.
• Reinforcement learning is generic method for
resource utilization in Dynamic environment.
Motivation
• Public-key infrastructure based cryptographic algorithms
are usually considered as slower than their corresponding
symmetric key based algorithms due to their root in
modular arithmetic.
• Sequential implementation of RSA becomes compute-
intensive and takes lot of time and energy to execute.
• Difficulties in performing intense modular computation on
very large integer because of the limitation in size of basic
data types available with GCC infrastructure.
• Required algorithm that provide efficient parallel
implementation of RSA to be executed on multi-core
machine.
Conventional Vs Public key Encryption
Literature survey
Title Author Publication Findings
Handbook of
applied
cryptography.
Menezes, Alfred
J., Paul C. Van
Oorschot, and
Scott A
CRC press, 2010. How RL use to opportunistically
route the packet even in the
absence of Reliable knowledge
about channel statistic and network
model.
"New directions in
cryptography.”
Die, Whiteld, and
Martin E.
Hellman.
Information
Theory, IEEE
Transactions on
22.6 (1976): 644-
654.
It show the impact of PU activities
on the operation of OCR in channel
sensing, relay selection and data
transmission.
"An efficient
implementation of
RSA digital
signature
algorithm."
Cao, Ying-yu, and
Chong Fu.
Intelligent
Computation
Technology and
Automation (ICICTA),
2008 International
Conference on. Vol. 2.
IEEE, 2008.
Mapping of spectrum selection
metrics and local PU interference
observation to a packet forwarding
delay over the control channel.
Literature survey
Title Author Publication Findings
"A method for
obtaining digital
signatures and
public-key
cryptosystems."
Rivest, Ronald L.,
Adi Shamir, and Len
Adleman.
Communication
s of the ACM
21.2 (1978):
120-126.
The real time information exchange
inside the neighborhood and
adaptation to the CR very dynamic
spectrum opportunities.
Fast multiplication:
algorithms and
implementation.
Bewick, Gary W. Diss. Stanford
University,
1994.
Uses a distributed protocols to
collect some key parameters related
to paths from source to destination
"Constant-
optimized quantum
circuits for modular
multiplication
and
exponentiation."
Markov, Igor L., and
Mehdi Saeedi.
Quantum
Information
Computation
12.5-6 (2012):
361-394.
An Artificial ANT colony system can
be used for discovering, observing
and learning of routing strategies by
guided ants communication in an
indirect way.
Mathematical Modeling
• Markov Decision Process
A Markov process is a stochastic process with the
following properties:
• Outcomes or states is finite.
• The outcome at any stage depends only on the
outcome of the previous stage.
• The probabilities are constant over time
RSA Algorithm with Example
Proposed Work
Methodology
• Temporal Difference : TD(0) procedural form
Initialize V(s) arbitrarily, π to the policy to be evaluated
Repeat (for each episode):
Initialize s
Repeat (for each step of episode):
a← action given by π for s
Take action a; observe reward, r and next state, 𝒔′
𝑉 𝑠 ← 𝑉 𝑠 + 𝛼[𝑟 + 𝛾𝑉 𝑠′ − 𝑉(𝑠)]
s ← 𝑠′
Until s is terminal
Advantages and Disadvantages
• Advantages
– Parallel RSA perform fast computation that save
energy and time of execution.
– Their is no limitation of size of basic data types
available in GCC with this algorithms because of
GNU's MP Library.
– Performance gain due to parallelization on multiple
cores of system with the help of OpenMP Library.
– Provide fast execution with respect to sequential
version.
– Public-key systems can provide digital signatures
that cannot be repudiated.
Application
• It is useful to Data signature and
encryption application.
• Protocols supporting e-commerce today.
• Fast computation for data security
Conclusion
• The parallel RSA gives the improved result
using OpenMP in combination with GCC
infrastructure and GNU's MP library.
• The parallel RSA are more efficient than that
of the sequential version of it in terms of time
and energy.
Future Scope
• The programs used are executed in dual
quad core environment which are based on
repeated square and multiply method. They
could be performed with other modular
exponentiation methods and improving
upon synchronization issues which will
further improve the run-time.
References
1. Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone.
Handbook of applied cryptography CRC press, 2010.
2. Die, Whiteld, and Martin E. Hellman. "New directions in
cryptography." Information Theory, IEEE Transactions on 22.6
(1976): 644-654.
3. Cao, Ying-yu, and Chong Fu. "An ecient implementation of RSA
digital signature algorithm." Intelligent Computation Technology and
Automation (ICICTA), 2008 International Conference on. Vol. 2. IEEE,
2008.
4. Rivest, Ronald L., Adi Shamir, and Len Adleman. "A method for
obtaining digital signatures and public-key cryptosystems."
Communications of the ACM 21.2 (1978): 120-126.
5. The gnu multiple precision arithmetic library edition 2002
6. Chandra, Rohit, ed. Parallel programming in OpenMP. Morgan
Kaufmann, 2001.
References
7. Pieprzyk, Josef, and David Pointcheval. "Parallel authentication and
public-key encryption." Information Security and Privacy. Springer
Berlin Heidelberg, 2003.
8. Barrett, Paul. "Implementing the Rivest Shamir and Adleman public
key encryption algorithm on a standard digital signal processor."
Advances in cryptologyCRYPTO86. Springer Berlin Heidelberg, 1987.
9. Viot, Diego, et al. "Modular Multiplication Algorithm For PKC."
Universiadade Federal do Ceard, LESC (2008).
10. Cohen, Henri, Gerhard Frey, Roberto Avanzi, Christophe Doche,
Tanja Lange, Kim Nguyen, and Frederik Vercauteren, eds. Handbook
of elliptic and hyperelliptic curve cryptography. CRC press, 2010
11. Bewick, Gary W. Fast multiplication: algorithms and
implementation. Diss. Stanford University, 1994.
12. Markov, Igor L., and Mehdi Saeedi. "Constant-optimized quantum
circuits for modular multiplication and exponentiation." Quantum
Information Computation 12.5-6 (2012): 361-394.
•Thank You !!

More Related Content

What's hot

Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abstncct
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projectsVijay Karan
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)S3 Infotech IEEE Projects
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...Polytechnique Montreal
 
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...SBGC
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsVijay Karan
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
 
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Polytechnique Montreal
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...paperpublications3
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...ijwmn
 

What's hot (20)

Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
 
A044030110
A044030110A044030110
A044030110
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
 
F505052131
F505052131F505052131
F505052131
 
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
 
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
 
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...Using Neighbor’s State Cross-correlation to Accelerate Adaptation  in Docitiv...
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
 

Similar to An Efficient Parallel Algorithm for Secured Data Communication Using RSA Public Key Cryptography Method

Evaluation of Different Machine.pptx
Evaluation of Different Machine.pptxEvaluation of Different Machine.pptx
Evaluation of Different Machine.pptxtariqqureshi33
 
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...ssuser4b1f48
 
Cognitive Technique for Software Defined Optical Network (SDON)
Cognitive Technique for Software Defined Optical Network (SDON)Cognitive Technique for Software Defined Optical Network (SDON)
Cognitive Technique for Software Defined Optical Network (SDON)CPqD
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation ofcaijjournal
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...IJCNCJournal
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...IJCNCJournal
 
PEARC17:A real-time machine learning and visualization framework for scientif...
PEARC17:A real-time machine learning and visualization framework for scientif...PEARC17:A real-time machine learning and visualization framework for scientif...
PEARC17:A real-time machine learning and visualization framework for scientif...Feng Li
 
Real-Time Streaming Data Analysis with HTM
Real-Time Streaming Data Analysis with HTMReal-Time Streaming Data Analysis with HTM
Real-Time Streaming Data Analysis with HTMNumenta
 
Azure 機器學習 - 使用Python, R, Spark, CNTK 深度學習
Azure 機器學習 - 使用Python, R, Spark, CNTK 深度學習 Azure 機器學習 - 使用Python, R, Spark, CNTK 深度學習
Azure 機器學習 - 使用Python, R, Spark, CNTK 深度學習 Herman Wu
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
 
Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...IJSCAI Journal
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...ijscai
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...ijscai
 
Scientific
Scientific Scientific
Scientific marpierc
 

Similar to An Efficient Parallel Algorithm for Secured Data Communication Using RSA Public Key Cryptography Method (20)

Evaluation of Different Machine.pptx
Evaluation of Different Machine.pptxEvaluation of Different Machine.pptx
Evaluation of Different Machine.pptx
 
Introduction_PPT.pptx
Introduction_PPT.pptxIntroduction_PPT.pptx
Introduction_PPT.pptx
 
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...
 
Cognitive Technique for Software Defined Optical Network (SDON)
Cognitive Technique for Software Defined Optical Network (SDON)Cognitive Technique for Software Defined Optical Network (SDON)
Cognitive Technique for Software Defined Optical Network (SDON)
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
 
PEARC17:A real-time machine learning and visualization framework for scientif...
PEARC17:A real-time machine learning and visualization framework for scientif...PEARC17:A real-time machine learning and visualization framework for scientif...
PEARC17:A real-time machine learning and visualization framework for scientif...
 
Real-Time Streaming Data Analysis with HTM
Real-Time Streaming Data Analysis with HTMReal-Time Streaming Data Analysis with HTM
Real-Time Streaming Data Analysis with HTM
 
Azure 機器學習 - 使用Python, R, Spark, CNTK 深度學習
Azure 機器學習 - 使用Python, R, Spark, CNTK 深度學習 Azure 機器學習 - 使用Python, R, Spark, CNTK 深度學習
Azure 機器學習 - 使用Python, R, Spark, CNTK 深度學習
 
Hou_Resume
Hou_ResumeHou_Resume
Hou_Resume
 
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
GSU-RF-2013-Reddy-3
GSU-RF-2013-Reddy-3GSU-RF-2013-Reddy-3
GSU-RF-2013-Reddy-3
 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
 
Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
 
Scientific
Scientific Scientific
Scientific
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

An Efficient Parallel Algorithm for Secured Data Communication Using RSA Public Key Cryptography Method

  • 1. Presentation On An Efficient Parallel Algorithm for Secured Data Communication Using RSA Public Key Cryptography Method Presented by: Harshal Solao
  • 2. Outline • Introduction • Motivation • Literature Review • Mathematical Model • RSA Algorithm with Example • Parallelization of RSA • Methodology • Advantages and Limitations • Application • Conclusion • Future Scope • References
  • 3. Introduction • The need of spectrum is increasing exponentially in wireless networking due to increasing demand for new wireless services and application. • Routing is challenging problem due to fitful availability of Spectrum and incomplete knowledge of environment. • Reinforcement learning is generic method for resource utilization in Dynamic environment.
  • 4. Motivation • Public-key infrastructure based cryptographic algorithms are usually considered as slower than their corresponding symmetric key based algorithms due to their root in modular arithmetic. • Sequential implementation of RSA becomes compute- intensive and takes lot of time and energy to execute. • Difficulties in performing intense modular computation on very large integer because of the limitation in size of basic data types available with GCC infrastructure. • Required algorithm that provide efficient parallel implementation of RSA to be executed on multi-core machine.
  • 5. Conventional Vs Public key Encryption
  • 6. Literature survey Title Author Publication Findings Handbook of applied cryptography. Menezes, Alfred J., Paul C. Van Oorschot, and Scott A CRC press, 2010. How RL use to opportunistically route the packet even in the absence of Reliable knowledge about channel statistic and network model. "New directions in cryptography.” Die, Whiteld, and Martin E. Hellman. Information Theory, IEEE Transactions on 22.6 (1976): 644- 654. It show the impact of PU activities on the operation of OCR in channel sensing, relay selection and data transmission. "An efficient implementation of RSA digital signature algorithm." Cao, Ying-yu, and Chong Fu. Intelligent Computation Technology and Automation (ICICTA), 2008 International Conference on. Vol. 2. IEEE, 2008. Mapping of spectrum selection metrics and local PU interference observation to a packet forwarding delay over the control channel.
  • 7. Literature survey Title Author Publication Findings "A method for obtaining digital signatures and public-key cryptosystems." Rivest, Ronald L., Adi Shamir, and Len Adleman. Communication s of the ACM 21.2 (1978): 120-126. The real time information exchange inside the neighborhood and adaptation to the CR very dynamic spectrum opportunities. Fast multiplication: algorithms and implementation. Bewick, Gary W. Diss. Stanford University, 1994. Uses a distributed protocols to collect some key parameters related to paths from source to destination "Constant- optimized quantum circuits for modular multiplication and exponentiation." Markov, Igor L., and Mehdi Saeedi. Quantum Information Computation 12.5-6 (2012): 361-394. An Artificial ANT colony system can be used for discovering, observing and learning of routing strategies by guided ants communication in an indirect way.
  • 8. Mathematical Modeling • Markov Decision Process A Markov process is a stochastic process with the following properties: • Outcomes or states is finite. • The outcome at any stage depends only on the outcome of the previous stage. • The probabilities are constant over time
  • 11. Methodology • Temporal Difference : TD(0) procedural form Initialize V(s) arbitrarily, π to the policy to be evaluated Repeat (for each episode): Initialize s Repeat (for each step of episode): a← action given by π for s Take action a; observe reward, r and next state, 𝒔′ 𝑉 𝑠 ← 𝑉 𝑠 + 𝛼[𝑟 + 𝛾𝑉 𝑠′ − 𝑉(𝑠)] s ← 𝑠′ Until s is terminal
  • 12. Advantages and Disadvantages • Advantages – Parallel RSA perform fast computation that save energy and time of execution. – Their is no limitation of size of basic data types available in GCC with this algorithms because of GNU's MP Library. – Performance gain due to parallelization on multiple cores of system with the help of OpenMP Library. – Provide fast execution with respect to sequential version. – Public-key systems can provide digital signatures that cannot be repudiated.
  • 13. Application • It is useful to Data signature and encryption application. • Protocols supporting e-commerce today. • Fast computation for data security
  • 14. Conclusion • The parallel RSA gives the improved result using OpenMP in combination with GCC infrastructure and GNU's MP library. • The parallel RSA are more efficient than that of the sequential version of it in terms of time and energy.
  • 15. Future Scope • The programs used are executed in dual quad core environment which are based on repeated square and multiply method. They could be performed with other modular exponentiation methods and improving upon synchronization issues which will further improve the run-time.
  • 16. References 1. Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography CRC press, 2010. 2. Die, Whiteld, and Martin E. Hellman. "New directions in cryptography." Information Theory, IEEE Transactions on 22.6 (1976): 644-654. 3. Cao, Ying-yu, and Chong Fu. "An ecient implementation of RSA digital signature algorithm." Intelligent Computation Technology and Automation (ICICTA), 2008 International Conference on. Vol. 2. IEEE, 2008. 4. Rivest, Ronald L., Adi Shamir, and Len Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126. 5. The gnu multiple precision arithmetic library edition 2002 6. Chandra, Rohit, ed. Parallel programming in OpenMP. Morgan Kaufmann, 2001.
  • 17. References 7. Pieprzyk, Josef, and David Pointcheval. "Parallel authentication and public-key encryption." Information Security and Privacy. Springer Berlin Heidelberg, 2003. 8. Barrett, Paul. "Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor." Advances in cryptologyCRYPTO86. Springer Berlin Heidelberg, 1987. 9. Viot, Diego, et al. "Modular Multiplication Algorithm For PKC." Universiadade Federal do Ceard, LESC (2008). 10. Cohen, Henri, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange, Kim Nguyen, and Frederik Vercauteren, eds. Handbook of elliptic and hyperelliptic curve cryptography. CRC press, 2010 11. Bewick, Gary W. Fast multiplication: algorithms and implementation. Diss. Stanford University, 1994. 12. Markov, Igor L., and Mehdi Saeedi. "Constant-optimized quantum circuits for modular multiplication and exponentiation." Quantum Information Computation 12.5-6 (2012): 361-394.