A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption

被引:6
作者
Obimbo, Charlie [1 ]
Salami, Behzad [1 ]
机构
[1] Univ Guelph, Dept Computing & Informat Sci, Guelph, ON N1G 2W1, Canada
关键词
Parallel Algorithms; cryptography; Block Ciphers; systems of linear equations; modular arithmetic; inverse of a matrix; row-echelon reduction;
D O I
10.1007/s11227-007-0107-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the current world that we live in, of rapid growing technology, and especially reliance on the Internet for our daily lively hood (Banking, shopping, entertainment, news), and also with current crimes (Identity-theft, hacking, spyware), computer security is becoming more and more important. By "computer security" we often refer to addressing three important aspects of a computer-related system: Confidentiality, integrity, and availability. Encryption clearly addresses the need for confidentiality of data, both in storage and transmission. However, the use of encryption can be cumbersome and time consuming. It is important to have a fast algorithm to both encrypt and decrypt data as needed. Public key encryption, though secure, is definitely not fast enough to be used for large size data. We introduce a Parallel Algorithm for computation of inverses of matrices modulo n. This is used in conjunction with Block Ciphers and Hill Ciphers in symmetric encryption and decryption of data for transmission on open lines. Experimental studies were done to compare the run-time of this algorithm on parallel machines, to the traditional one. The new algorithm was found to perform much better than the traditional one, and would be useful to use in encryption/decryption of large sensitive data.
引用
收藏
页码:113 / 130
页数:18
相关论文
共 21 条
[1]  
Amdahl G. M., 1967, P APR 18 20 1967 SPR, P483, DOI [10.1145/1465482.1465560, DOI 10.1145/1465482.1465560]
[2]  
[Anonymous], HILL CIPHERS MODULAR
[3]  
ANTON H, 1991, ELEMENTARY LINEAR AL
[4]  
BUZBEE BL, 1983, FRONTIERS SUPERCOMPU, P71
[5]  
Cormen T. H., 2001, Introduction to Algorithms, V2nd
[6]  
DAEMEN J, 1994, LECT NOTES COMPUTER, V809, P18
[7]  
DAEMEN J, 2001, DESIGN RIJNDEAL
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
EHRSAM, 1975, Patent No. 3962539
[10]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472