DocumentCode :
2052127
Title :
ES-MPICH2: Message passing interface with enhanced key agreement
Author :
Sudha, J. ; Paranthaman, V.
Author_Institution :
Dept. of CSE, Arunai Eng. Coll., Tiruvannamalai, India
fYear :
2013
fDate :
21-22 Feb. 2013
Firstpage :
379
Lastpage :
384
Abstract :
In the concept of MPI chatting and file transmission are implemented, the decryption part will be done automatically. Here we use three methods in the keys; they are public, private and secret key. Keys are displayed to the destination only if they accept the request or else displaying of key is not possible in the destination side and also it won´t give or establish the Connection. In largely spread clusters, computing nodes are naturally deployed in a variety of computing sites. The Information processed in a spread cluster is communal among a group of distributed processes or client by high-quality of messages passing protocols (e.g. message passing interface - MPI) running on the Internet. Because of the open available nature of the Internet, data encryption for these large-scale distributed clusters becomes a non-trivial and challenging problem. We improved the security of the MPI (Message Passing Interface) protocol by encrypting and decrypting messages sent and received among computing nodes. We are listening carefully on MPI rather than more protocols because MPI is one of the most accepted communication protocols for cluster computing environments. From among a multiple of MPI implementations, we selected MPICH2 developed by the Argonne National Laboratory. Design goal of MPICH2 - a commonly use MPI implementation - is to join portability with high presentation. we gives a security enhanced MPI-library with the standard MPI interface, data communications of a conservative MPI program can be secured without converting the program into the corresponding secure report. We included encryption algorithms into the MPICH2 library so that data in secret of MPI applications could be readily preserved without require modifying the source codes of the MPI applications.
Keywords :
Internet; application program interfaces; cryptographic protocols; data communication; message passing; private key cryptography; public key cryptography; source coding; Argonne National Laboratory; ES-MPICH2; MPI chatting; MPI protocol security; cluster computing environments; communication protocols; computing nodes; computing sites; conservative MPI program; data communications; data encryption; distributed process; enhanced key agreement; file transmission; high-quality message passing protocols; information processing; large-scale distributed clusters; message decryption algorithm; message encryption algorithm; message passing interface; open available Internet; private key; public key; secret key; source codes; standard MPI interface; Algorithm design and analysis; Elliptic curve cryptography; Encryption; Message passing; Protocols; Decryption; Encryption; Message Passing Interface;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2013 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4673-5786-9
Type :
conf
DOI :
10.1109/ICICES.2013.6508263
Filename :
6508263
Link To Document :
بازگشت