Performance of cryptographic protocols for high-performance, high-bandwidth and high-latency grid systems

Himanshu Khurana, Radostina Koleva, Jim Basney

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Grid security solutions address critical requirements and are constructed from building blocks comprising cryptographic algorithms and protocols. Choosing the most appropriate algorithms and protocols requires an ongoing evaluation of performance and security properties, given continuing advances in system performance, optimizations, security analyses, and cryptographic techniques. Today, the Globus Toolkit's Grid Security Infrastructure (GSI) is a leading provider of security solutions based on the RSA cryptosystem. Recently, cryptosystems based on bilinear pairings have been proposed as an alternative with the promise of increased efficiency and scalability. In this work we evaluate this alternative compared to Elliptic Curve Cryptography (ECC) and RSA in terms of their computation and communication overheads for today's Grid systems. Our analysis and experiments lead us to conclude that RSA continues to be a good choice for the foreseeable future. Furthermore, our results are intuitively aligned with the high-performance, high-bandwidth, and high-latency nature of Grid systems.

Original languageEnglish (US)
Title of host publicationProceedings - e-Science 2007, 3rd IEEE International Conference on e-Science and Grid Computing
Pages431-438
Number of pages8
DOIs
StatePublished - 2007
EventE-Science 2007, 3rd IEEE International Conference on E-Science and Grid Computing - Bangalore, India
Duration: Dec 10 2007Dec 13 2007

Publication series

NameProceedings - e-Science 2007, 3rd IEEE International Conference on e-Science and Grid Computing

Other

OtherE-Science 2007, 3rd IEEE International Conference on E-Science and Grid Computing
Country/TerritoryIndia
CityBangalore
Period12/10/0712/13/07

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Performance of cryptographic protocols for high-performance, high-bandwidth and high-latency grid systems'. Together they form a unique fingerprint.

Cite this