Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

Junweon W. Yoon, Taeyoung Y. Hong, Jangwon W. Choi, Chanyeol Y. Park, Kibong B. Kim, Heonchang C. Yu

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)


Over the years, parallel computing models have been proposed to solve large-scale application problems. P2P and cloud computing are well-known distributed computing models and have the advantage of running and implementing the parallel computing. Applying the advantages of both models can enhance the benefits of parallel computing. In this paper, we analyze the efficiency of key search algorithm by combining P2P and cloud computing. For our experiment, we apply the key search algorithm in the field of cryptography. The length of the key, which is stable criterion of cryptographic algorithm, is judged according to the amount of exhaustive key search. And the key space required for the whole investigation is easy to divide and is very appropriate for parallel calculation of P2P environment. In addition, cloud computing can provide the fitting environment to meet the various user requirements using virtualization technology. We conduct the following two performance experiments with P2P and cloud computing. First, we propose the method to guarantee the performance in P2P environment based on virtualization. Next, we simulate the performance of the suggested encryption method in the aforementioned system environment. Results reveal effectiveness and validity of the proposed system environment, which can also provide both scalability and flexibility.

Original languageEnglish
Pages (from-to)1206-1216
Number of pages11
JournalPeer-to-Peer Networking and Applications
Issue number6
Publication statusPublished - 2018 Nov 1

Bibliographical note

Publisher Copyright:
© 2018, Springer Science+Business Media, LLC, part of Springer Nature.


  • Block cipher
  • Cloud computing
  • DES
  • P2P computing
  • Virtualization

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications


Dive into the research topics of 'Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers'. Together they form a unique fingerprint.

Cite this