Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer

Now-a-days data is needed to be exchanged through networks in secure manner. Hence for secure communication required cryptography algorithms. Among these algorithms is Twofish cryptographic algorithm. In this paper the Sequential and parallel implementation have been implemented in IMAN1 supercomputer using Message Passing Interface (MPI). The parallel implementation has been evaluated in terms of execution time, speedup, and efficiency. The simulation results show that 256 key lengths in 4 processors get best efficiency up to 37% while 192 and 128 key length achieves up to 33% and 29% in order.

[1]  King Abdullah,et al.  New Routing Algorithm for Hex-Cell Network , 2015 .

[2]  Murat Dener,et al.  Security Analysis in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[3]  S. R. Biradar,et al.  Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL , 2013 .

[4]  Kris Gaj,et al.  Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining , 2001, FPGA '01.

[5]  Shahnawaz Hussain,et al.  Evaluation of DES, TDES, AES, Blowfish and Twofish Encryption Algorithm: Based on Space Complexity , 2014 .

[6]  Bruce Schneier,et al.  On the Twofish Key Schedule , 1998, Selected Areas in Cryptography.

[7]  Deepali D. Rane Superiority of Twofish over Blowfish , 2016 .

[8]  Qatawneh Mohammed EMBEDDING LINEAR ARRAY NETWORK INTO THE TREE-HYPERCUBE NETWORK , 2005 .

[9]  King Abdullah,et al.  Performance Evaluation of Parallel Sorting Algorithms on IMAN1 Supercomputer , 2016 .

[10]  Mansoor Ebrahim,et al.  Symmetric Algorithm Survey: A Comparative Analysis , 2013, ArXiv.

[11]  Mohammad Qatawneh New Efficient Algorithm for Mapping Linear Array into Hex-Cell Network , 2016 .

[12]  Harsh K. Verma,et al.  Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms , 2012 .

[13]  Mohammad Saraireh A Novel Security Scheme based on Twofish and Discrete Wavelet Transform , 2017 .

[14]  Mohammad Qatawneh Multilayer Hex-Cells: A New Class of Hex-Cell Interconnection Networks for Massively Parallel Systems , 2011, Int. J. Commun. Netw. Syst. Sci..

[15]  Stefan Lucks The Saturation Attack - A Bait for Twofish , 2000, FSE.

[16]  K nbspAparna.,et al.  A Study of Twofish Algorithm , 2016 .

[17]  Mohammad Qatawneh,et al.  Embedding Binary Tree and Bus into Hex-Cell Interconnection Network , 2011 .