ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Cryptography

Essay by   •  November 1, 2010  •  Research Paper  •  7,991 Words (32 Pages)  •  931 Views

Essay Preview: Cryptography

Report this essay
Page 1 of 32

Tomorrow\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'s Cryptography:

Parallel Computation via Multiple Processors, Vector

Processing, and Multi-Cored Chips

Eric C. Seidel, advisor Joseph N. Gregg PhD

December 30, 2002

Abstract. This paper summarizes my research during my independent study on cryptography

in the fal l term of 2002. Here I state the growing need for better cryptography, introduce con-

sumer hardware architectures of near future, and identify the growing discrepancy between

the hardware on which current cryptographic standards were designed and the hardware the

future consumer wil l be using. I note then the need for a new \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"modern\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\" cryptography based

on the presence of paral lel processing capabilities in forthcoming consumer machines and the

lack of support of such capabilities in some current and al l legacy crypto algorithms. I list

approaches used in past research to paral lelize cryptographic algorithms. I then summarize

various current algorithms and potential implementation changes to ready them for tomor-

row\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'s machines. I conclude with some brief discussion of newer cryptographic algorithms,

particularly AES and AES finalists and how they wil l fare on the machines of the future.

Eric.C.Seidel@lawrence.edu; Joseph.N.Gregg@lawrence.edu

1

Contents

1 The future of crypto 3

2 Parallel crypto of to day 6

3 The imp ortance of data-level changes 8

4 Making data-level changes 9

4.1 Hashing Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

4.1.1 MD5 - Message Digest 5 . . . . . . . . . . . . . . . . . . . . . . . . . 13

4.1.2 SHA-1, Secure Hash Algorithm - Revision 1 . . . . . . . . . . . . . . 14

4.1.3 RIPEMD-160 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

4.1.4 Tiger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

4.2 Block Cyphers (Secret Key Cryptography) . . . . . . . . . . . . . . . . . . . 17

4.2.1 DES - Data Encryption Standard . . . . . . . . . . . . . . . . . . . . 18

4.2.2 3DES - \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"Tripple-Des\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\" .......................... 20

4.2.3 Serpent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

4.2.4 Twofish . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

4.2.5 Rijndael - the American Encryption Standard . . . . . . . . . . . . . 22

4.2.6 RC6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

4.3 Public-Key Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

4.3.1 RSA - Prime Factorization . . . . . . . . . . . . . . . . . . . . . . . . 26

5 Final Thoughts 27

2

1 The future of crypto

From bank accounts, to medical records, personal emails, and more, increasingly more and

more sensitive data is stored digitally. With the continued growth of the Internet, more

and more of this data resides in places which themselves may not be secure from intruders,

and much of this data is transferred

daily from place to place across connections inherently

insecure. To solve these problems of digital data security, we have cryptography. Most cryp-

tography however has historically been used by governments, larger business and computer

geeks and not by the average consumer. But, needs are shifting, and consumers are increas-

ingly using encrypted emails, encrypted

...

...

Download as:   txt (44.6 Kb)   pdf (427.5 Kb)   docx (31.1 Kb)  
Continue for 31 more pages »
Only available on ReviewEssays.com