CMPT-585 Computer & Data Security By Ayesha Mohiuddin Ramazan Burus Advisor: Stefan A. Robila Generating Large Prime Numbers for Cryptographic Algorithms.

Slides:



Advertisements
Similar presentations
MS Access.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Seeking prime numbers quickly through parallel-computing Daniel J. Wright.
FUNDAMENTALS OF COMPUTER SYSTEMS OCR GCSE Computing.
Whiteboardmaths.com © 2004 All rights reserved
DISTRIBUTED COMPUTING & MAP REDUCE CS16: Introduction to Data Structures & Algorithms Thursday, April 17,
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Hardware Basics: Inside the Box 2  2001 Prentice Hall2.2 Chapter Outline “There is no invention – only discovery.” Thomas J. Watson, Sr. What Computers.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
CMPT-585 Project Presentation Ayesha Mohiuddin Ramazan Burus Generating Prime Numbers using Grid Computing.
Grid programming with components: an advanced COMPonent platform for an effective invisible grid © 2006 GridCOMP Grids Programming with components. An.
Interpret Application Specifications
Virtual Memory BY JEMINI ISLAM. What is Virtual Memory Virtual memory is a memory management system that gives a computer the appearance of having more.
Parking Space Finder Lucia Wiguno April 8,
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Graphical Tree-Based Scientific Calculator: CalcuWiz Will Ryan Christian Braunlich.
SECTION 5-2 Large Prime Numbers Slide THE INFINITUDE OF PRIMES Slide There is no largest prime number. Euclid proved this around 300 B.C.
Web-based Software Development - An introduction.
1 ENG236: Introduction (1) Rocky K. C. Chang THE HONG KONG POLYTECHNIC UNIVERSITY.
 2003 Prentice Hall, Inc. All rights reserved. Chapter 1 – Introduction to Computers, the Internet, and the Web Outline 1.1 Introduction 1.2 What Is a.
Why Program? Computer – programmable machine designed to follow instructions Program – instructions in computer memory to make it do something Programmer.
Introduction to IT and Communications Technology Justin Champion Network Connections & Number Systems.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
PayDox Corporate Document Management System Rotech AB Interface Ltd Business Software Integration.
Computer Hardware and Software Chapter 1. Overview Brief History of Computers Hardware of a Computer Binary and Hexadecimal Numbers Compiling vs. Interpreting.
Cryptography and Network Security
INTRODUCTION TO COMPUTING
Facilimanage Dynamics aka “Facilies” CS 499 Final Presentation Curtis McKay Manneet Singh Brad Vonder Haar.
Chapter Two Hardware Basics: Inside the Box. ©1999 Addison Wesley Longman2.2 Chapter Outline What Computers Do A Bit About Bits The Computer’s Core: CPU.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Copyright © 2012 Pearson Education, Inc. Chapter 1: Introduction to Computers and Programming.
Unit - 1 Basic Computer Architecture P. Sugin Benzigar.
PHP With Oracle 11g XE By Shyam Gurram Eastern Illinois University.
Fundamentals of Database Chapter 7 Database Technologies.
Rensselaer Polytechnic Institute CSCI-4210 – Operating Systems CSCI-6140 – Computer Operating Systems David Goldschmidt, Ph.D.
Of Rostock University DuDE: A D istributed Computing System u sing a D ecentralized P2P E nvironment The 4th International Workshop on Architectures, Services.
Introduction to CMPT 225. What’s on the menu? Grading Course content Who’s who The story of life.
Oracle 10g Database Administrator: Implementation and Administration Chapter 2 Tools and Architecture.
Curtis Spencer Ezra Burgoyne An Internet Forum Index.
Learning Objective The students should be able to: a. state the definition of software b. state the usage of software c. list different types of software.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Parts of a Computer - Introduction
DISTRIBUTED DATABASES JORGE POMBAR. Overview Most businesses need to support databases at multiple sites. Most businesses need to support databases at.
U N I V E R S I T Y O F S O U T H F L O R I D A Hadoop Alternative The Hadoop Alternative Larry Moore 1, Zach Fadika 2, Dr. Madhusudhan Govindaraju 2 1.
Distributed System Services Fall 2008 Siva Josyula
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Rolando Gaytan Clay Schumacher Josh Weisskopf Cory Simon Aaron Steil (Reiman Gardens) – Client Dr. Tien Nguyen - Advisor.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Ziyad Ibrahim 10DD.  What is Internet? What is Internet?  Who owns the internet? Who owns the internet?  How do you connect to the internet? How do.
TM 8-1 Copyright © 1999 Addison Wesley Longman, Inc. Client/Server and Middleware.
G053 - Lecture 02 Search Engines Mr C Johnston ICT Teacher
The System Unit What is the system unit? p Fig. 4-1 Next  Case that contains electronic components of the computer used to process data  Sometimes.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Introduction Computer Organization Spring 1436/37H (2015/16G) Dr. Mohammed Sinky Computer Architecture
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Next Generation of Apache Hadoop MapReduce Owen
PARALLEL AND DISTRIBUTED PROGRAMMING MODELS U. Jhashuva 1 Asst. Prof Dept. of CSE om.
09/06/ Data Representation ASCII, Binary Denary Conversion, Integer & Boolean data types.
Brian Varela Group F February 16, 2010 What is the difference between a client and a server?
Key management issues in PGP
Defining Performance Which airplane has the best performance?
Role of the Systems Analyst
e-Health Platform End 2 End encryption
Java Embedded Network Intrusion Security
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Presentation transcript:

CMPT-585 Computer & Data Security By Ayesha Mohiuddin Ramazan Burus Advisor: Stefan A. Robila Generating Large Prime Numbers for Cryptographic Algorithms Using Distributed Computing

Prime Numbers  Used in cryptographic algorithms: e.g. RSA algorithm, PKE, PKI, Diffie-Helman key exchange  GIMPS; Great Internet Mersenne Prime Search: A Mersenne prime is a prime of the form 2 P -1.  On February 18, 2005, Dr. Martin Nowak from Germany, discovered the 42nd known Mersenne Prime, 2 25,964, The number is nearly 7.8 million digits large. It took more than 50 days of calculations on his 2.4 GHz Pentium 4 computer.

Problem Setting  Generate and store the prime numbers within a set range of values. (such as 1 to a billion)  Use distributed computing to speed up the generation.  Use database technologies to store the numbers.

Approach  Programming language used: JAVA  Database: ORACLE  Object: Build a grid of multiple clients calculating prime numbers between unique ranges of numbers, to obtain a list of large prime numbers.

Oracle Database MasterClient 1 Client 2 Client 3 Architecture Computing Structure

Clients  Allotted a unique Id and time limit.  Gets the range of numbers to calculate within. Master  Keeps monitoring the activity.  Re-assigns range to another client if original client does not complete within its allotted time. (1 day: for our experiment) Database  Stores the client information and the resulted Prime numbers sent by the clients. 3 Components

Setting Client side program responsibilities:  Connect to the database through internet.  Take a range of numbers to work on, communicate that the range has been taken, and start calculating primes within that range.  Connect to database again for each found prime number and put that into its corresponding table  When done communicate completion of task and take another range for new calculations. Administration Side responsibilities:  Assign different ranges to different clients and receive results in tables.  Keep track of jobs, if a taken job is not done up to a certain time by a node, then consider the node dead and re-assign the same range to another client node. The new node should somehow start from where old one left off.

 As Numbers keep getting larger, number of prime numbers keep decreasing. For example:  Variable ranges required for each clients. Number Ranges Client 1Client 2Client ……… 430 primes between 1 to 3000 and 353 primes between 3000 to 6000, so on.

Results  Executable: 1.29 MB  Memory usage: 10 MB  CPU usage: 7 to 10 %  Total primes stored :  Largest Prime stored:  In 12 hours using only 6 nodes, Primes within the maximum range of 461 million were found.

 In 12 hours using only 6 nodes, which is a really small number, we were able to find primes within the maximum range of 461 million.  This speed can be increased further by using more client nodes, more efficient algorithm for finding prime numbers.  It would be better if the client side code is wrapped into a screen saver, so that it only starts executing when the client user’s computer is idle in order not to obstruct their own work. Thoughts & Conclusion

Useful Links Used in the Project  Crow, Jerry. “Prime Numbers in Public Key Cryptography”, GSEC Practical Assignment. SANS Institute  GIMPS (The Great Internet Mersenne Prime Search), 2004,  Havil, J., Gamma: Exploring Euler's Constant, Princeton, NJ: Princeton University Press,  A. Languasco, and A. Perelli. “Prime Numbers and Cryptography”  Lewis, John and Loftus, William. “Java Software Solutions”. 2nd edition, Addison Wesley Longman, 2001  Pfleeger, Charles and Pfleeger, Shari. “Security in Computing”. Prentice Hall 2003, 3rd Edition  Weisstein, Eric W. "Prime Number." From MathWorld --A Wolfram Web Resource.