A CONCURRENT SOLUTION TO COMPUTER SECURITY

被引:0
作者
TURNER, SJ
机构
[1] Department of Computer Science, University of Exeter, Exeter, EX4 4PT, Prince of Wales Road
关键词
CONCURRENCY; COMPUTER SECURITY; AUTHENTICATION; ENCRYPTION;
D O I
10.1007/BF00150233
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper illustrates methods by which parallel processing may be used to construct computer systems that offer a much higher level of security than at present. As an example, the problem of devising a secure network login protocol is considered. Such protocols exist, but are not widely used, because the algorithms require calculations involving large integers and these are computationally expensive. Some of the ways in which concurrent programming techniques may be used to 'speed up' the execution of such protocols are discussed and it is shown how it would be cost-effective to add parallel 'accelerator' boards to a computer system for the purpose of executing such algorithms.
引用
收藏
页码:191 / 201
页数:11
相关论文
共 10 条
  • [1] CHAUM D, 1986, P CRYPTO 86, P200
  • [2] Cok R.S., 1991, PARALLEL PROGRAMS TR
  • [3] COOPER R, 1989, 2ND P C N AM TRANSP, P215
  • [4] ELBRA T, 1990, IN PRESS LAW COMPUTE, V1, P79
  • [5] GASKILL SJ, 1990, 2ND P NAT C LAW COMP, P21
  • [6] GOLDWASSER S, 1985, 17 STOC
  • [7] JARAMILLO C, 1989, 1989 P IEEE SOUTH, P197
  • [8] Knuth D.E., 1981, ART COMPUTER PROGRAM, V2
  • [9] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
  • [10] 1988, TRANSPUTER REFERENCE