Using the cluster computing to improve the speed of the modular exponentiation in RSA system

碩士 === 國防大學理工學院 === 電子工程碩士班 === 99 === In the digital times, information security becomes gradually popular research in IT (Information Technology) industry. Cryptography plays an important role in science and commerce. In many cryptography systems, RSA system is a great contribution to code. Its me...

Full description

Bibliographic Details
Main Authors: Chiu, Nai-Hsuan, 邱迺軒
Other Authors: Chang, Te-Jen
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/59497239264318085236
Description
Summary:碩士 === 國防大學理工學院 === 電子工程碩士班 === 99 === In the digital times, information security becomes gradually popular research in IT (Information Technology) industry. Cryptography plays an important role in science and commerce. In many cryptography systems, RSA system is a great contribution to code. Its method is based on modular exponentiation. We should use more bits to promote the security. In this paper, we improve the size of the variables in C language. The computer can store and compute the higher bits through the array. We call this method as “a large number calculation”. The operation of a large number is a very heavy burden for CPU. The larger the number becomes, the longer the computation time is. For increasing the computing speed, in addition to improve the algorithm, such as the binary method, the sliding window method, the addition chain method, and so on, the cluster computer can be used to advance computing speed. Write an effective parallel algorithm in each node of the cluster. This method will promote the speed of the modular exponentiation. Therefore, apart from C language, it uses MPICH2 software in this paper. The cluster is composed of laboratory computers by MPICH2. Extending two modes suits the parallel processes of the modular exponentiation by combining the sliding window method with the addition chain method. It significantly reduces the computation time of the modular exponentiation which more digits effectively use computing power per node. There are two advantages for using the cluster. Firstly, we use current resources to achieve high computing performance and reduce the cost of the research. Then, we improve the efficiency of computation to use the idle computers and avoid idle computers (idle computing resources) to be happened. In recent years, the cloud computing becomes the main research and the cluster computing is the beginning of the cloud computing. This paper combines the security issue with the cloud computing. In the future, it will contribute to the security of the cloud computing.