CMPT-585 Project Presentation Ayesha Mohiuddin Ramazan Burus Generating Prime Numbers using Grid Computing.

Slides:



Advertisements
Similar presentations
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Advertisements

Factoring of Large Numbers using Number Field Sieve Matrix Step Chandana Anand, Arman Gungor, and Kimberly A. Thomas ECE 646 Fall 2006.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Seeking prime numbers quickly through parallel-computing Daniel J. Wright.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Whiteboardmaths.com © 2004 All rights reserved
DISTRIBUTED COMPUTING & MAP REDUCE CS16: Introduction to Data Structures & Algorithms Thursday, April 17,
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
CMPT-585 Computer & Data Security By Ayesha Mohiuddin Ramazan Burus Advisor: Stefan A. Robila Generating Large Prime Numbers for Cryptographic Algorithms.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
1 An Empirical Study on Large-Scale Content-Based Image Retrieval Group Meeting Presented by Wyman
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
KEY COMPONENTS OF A COMPUTER SYSTEM ANDREW LOLAVAR.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
1 Mersenne Primes How to generate more prime numbers? Mersenne ( ) generated primes using formula: where p is a prime M 2 = 3; M 3 = 7, M 5 = 31,
© by Kenneth H. Rosen, Discrete Mathematics & its Applications, Sixth Edition, Mc Graw-Hill, 2007 Chapter 3 (Part 2): The Fundamentals: Algorithms, the.
Public-resource computing for CEPC Simulation Wenxiao Kan Computing Center/Institute of High Physics Energy Chinese Academic of Science CEPC2014 Scientific.
Copyright Jim Martin Computers Inside and Out Dr Jim Martin
Cryptography and Network Security
INTRODUCTION TO COMPUTING
1 More on Computer Components Computer switches Binary number system Inside the CPU Cache memory Types of RAM Computer buses Creating faster CPUs NEXT.
I Copyright © 2004, Oracle. All rights reserved. Introduction.
Internal Guide: Prof S M Narayana By: Meghana(1MS07CS049) Padmavathi T(1MS07CS057) Priyanka A L(1MS07CS069) Sandeep Kumar B(1MS07CS082)
Computer Systems Chapter 1 Pages Hardware-physical pieces Key hardware components in a computer system: The physical parts. – Central processing.
Unit - 1 Basic Computer Architecture P. Sugin Benzigar.
PHP With Oracle 11g XE By Shyam Gurram Eastern Illinois University.
Computers Data Representation Chapter 3, SA. Data Representation and Processing Data and information processors must be able to: Recognize external data.
Fundamentals of Database Chapter 7 Database Technologies.
Rensselaer Polytechnic Institute CSCI-4210 – Operating Systems CSCI-6140 – Computer Operating Systems David Goldschmidt, Ph.D.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
200/MAPLD 2004 Craven1 Super-Sized Multiplies: How Do FPGAs Fare in Extended Digit Multipliers? Stephen Craven Cameron Patterson Peter Athanas Configurable.
© T Madas. A prime number or simply a prime, is a number with exactly two factors. These two factors are always the number 1 and the prime number itself.
Mining High Utility Itemset in Big Data
CS 627 Project RSA Encryption/Decryption supporting Big Integer Arithmetic …Sagar Chivate.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
Curtis Spencer Ezra Burgoyne An Internet Forum Index.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
1 5. Abstract Data Structures & Algorithms 5.2 Static Data Structures.
ARSA: An Attack-Resilient Security Architecture for Multi-hop Wireless Mesh Networks Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced.
Parts of a Computer - Introduction
Chapter 2 (Part 1): The Fundamentals: Algorithms, the Integers & Matrices The Integers and Division (Section 2.4)
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
The Computer System CS 103: Computers and Application Software.
Hashed Files Text Versus Binary Meghan Cavanagh. Hashed Files a file that is searched using one of the hashing methods User gives the key, the function.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
1 The e-Logistics of Securing Distributed Medical Data Andrew M. Snyder Alfred C. Weaver.
History & Motivations –RDBMS History & Motivations (cont’d) … … Concurrent Access Handling Failures Shared Data User.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Computer Babble Talk Dung X. Nguyen Rice University.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Unit C-Hardware & Software1 GNVQ Foundation Unit C Bits & Bytes.
The System Unit What is the system unit? p Fig. 4-1 Next  Case that contains electronic components of the computer used to process data  Sometimes.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
The Processor & its components. The CPU The brain. Performs all major calculations. Controls and manages the operations of other components of the computer.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Computer Operation. Binary Codes CPU operates in binary codes Representation of values in binary codes Instructions to CPU in binary codes Addresses in.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
e-Health Platform End 2 End encryption
Chapter 5: Number Theory
COMP 1321 Digital Infrastructure
COMP 1321 Digital Infrastructure
The Largest Known Prime Number
Computers Inside and Out
In the front of your exercise book...
Week 05 Node.js Week 05
Presentation transcript:

CMPT-585 Project Presentation Ayesha Mohiuddin Ramazan Burus Generating Prime Numbers using Grid Computing

Prime Numbers Used in cryptographic algorithms: e.g. RSA algorithm, PKE, PKI, Diffie-Helman key exchange GIMPS; Great Internet Mersenne Prime Search: A Mersenne prime is a prime of the form 2P-1. On May 15, 2004, Josh Findley discovered the 41st known Mersenne Prime, 2 24,036, The number is nearly 7 million digits large. Josh's calculation took just over two weeks on his 2.4 GHz Pentium 4 computer.

Project Details: Programming language used: JAVA Database: ORACLE Object: Having a grid of multiple clients calculate prime numbers between unique ranges of numbers, to obtain a large list of prime numbers.

Oracle Database MasterClient 1 Client 2 Client 3 Grid Architecture Grid Structure

Client  Allotted a unique Id and time limit  Gets the range of numbers to calculate Master  Keeps monitoring the activity  Re-assigns range to another client if original client does not complete within its allotted time(1 day: for our experiment) Database  Stores the client information and the resulted Prime numbers sent by the clients 3 Components:

Number Ranges As Numbers keep increasing; Prime numbers keep decreasing

Conclusion Executable: 1.29 MB Memory usage: 10 MB CPU usage: 7 to 10 Total primes generated by now : Largest Prime found by now: Useful Links: