Evaluation of DES key search stability using Parallel Computing

병렬 컴퓨팅을 이용한 DES 키 탐색 안정성 분석

  • 윤준원 (KISTI 국가슈퍼컴퓨팅연구소) ;
  • 최장원 (KISTI 국가슈퍼컴퓨팅연구소) ;
  • 박찬열 (KISTI 국가슈퍼컴퓨팅연구소) ;
  • 공기식 (남서울대학교 멀티미디어학과)
  • Received : 2013.03.11
  • Accepted : 2013.03.25
  • Published : 2013.03.31


Current and future parallel computing model has been suggested for running and solving large-scale application problems such as climate, bio, cryptology, and astronomy, etc. Parallel computing is a form of computation in which many calculations are carried out simultaneously. And we are able to shorten the execution time of the program, as well as can extend the scale of the problem that can be solved. In this paper, we perform the actual cryptographic algorithms through parallel processing and evaluate its efficiency. Length of the key, which is stable criterion of cryptographic algorithm, judged according to the amount of complete enumeration computation. So we present a detailed procedure of DES key search cryptographic algorithms for executing of enumeration computation in parallel processing environment. And then, we did the simulation through applying to clustering system. As a result, we can measure the safety and solidity of cryptographic algorithm.


Supported by : KISTI


  1. Meng, Jiayuan, Raghunathan, Anand, Chakradhar, Srirnat T, Byna, Surendra , "Exploiting the forgiving nature of applications for scalable parallel execution", Parallel & Distributed Processing(IPDPS), pp.1-12, April 2010.
  2. N. Sadashiv, Kumar, S.M.D, "Cluster, grid and cloud computing:A detailed comparison", Computer Science & Education (ICCSE), pp.477-482, July 2011.
  3. Gavril Godza, Valentin Cristea, "Comparative Study of COW and SMP Computer Configurations", Parallel Computing in Electrical Engineering(PARELEC), pp. 205-210, September, 2002.
  4. Xiao Qian, Wang Chengguo, Guo Ge, "The Research of Parallel Computing for Large-Scale Finite Element Model of Wheel/Rail Rolling Contact", Computer Science and Information Technology(ICCSIT), pp. 254-257, July, 2010.
  5. Taejung Park, "CUDA-based Object Oriented Programming Techniques for Efficient Parallel Visualization of 3D Content", Journal of Digital Contents Society Vol.13 No. 2 pp. 169-176, June, 2012.
  6. Fox, Geoffrey C, "Lessons for massively parallel applications on message passing computers", Thirty-Seventh IEEE Computer Society International Conference, CMPCON, pp.103-114, 1992.
  7. Mamidala, Amith R, "Optimizing MPI Collectives UsingEfficient Intra-node Communication Techniques over the Blue Gene/P Supercomputer", Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), pp.771-780, May, 2011.
  8. NIST, FIPS PUB 46-2 : Announcing the Data Encryption Standard (DES)
  9. NIST, FIPS PUB 197:Announcing the Advanced Encryption Standard (AES)

Cited by

  1. Design of Resource Grouping for Desktop Grid Computing and Its Application Methods to Fault-Tolerance vol.14, pp.2, 2013,