Integrating Grid with Cryptographic Computing

  • Zhonghua Jiang
  • Dongdai Lin
  • Lin Xu
  • Lei Lin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3903)


Cryptographic and information security applications often involve many time-consuming computations, which need to be completed over heterogenous and geographically distributed computers. However, there lacks a general-purpose cryptographic computing environment. Grid technology can play a significant role in providing an efficient computational support for cryptographic applications. In this paper, we describe a general-purpose software architecture called Crypto-Grid for distributed high-performance cryptographic computing, which is designed on the top level of computational grid mechanisms, supported by grid environments such as Globus. The prototype implementation of Crypto-Grid under GT4 and experiment evaluation are also revealed.


Elliptic Curve Grid Service Virtual Organization Computing Engine Open Grid Service Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Lenstra, A., Manasse, M.: Factoring by Electronic Mail. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 355–371. Springer, Heidelberg (1990)CrossRefGoogle Scholar
  2. 2.
    Selkirk, A.P.L., Escott, A.E.: Distributed Computing Attacks on Cryptographic Systems. BT Technology Journal 17(2), 69–73 (1999)CrossRefGoogle Scholar
  3. 3.
    Asbrink, O., Brynielsson, J.: Factoring Large Integers Using Parallel Quadratic Sieve. Technical Report, Royal Institute of technology, Sweden (2000)Google Scholar
  4. 4.
    Atkins, D., Graft, M., Lenstra, A.K., Leyland, P.C.: The Magic Words are Squeamish Ossifrage. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 263–277. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  5. 5.
    Gropp, W., Lusk, E., Skjellum, A.: Using MPI: Portable Parallel Programming with the Message-Passing Interface. In: Scientific and engineering computation. MIT Press, Cambridge (1994)Google Scholar
  6. 6.
    Foster, I., Kesselman, C.: The grid 2: Blueprint for a New Computing Infrastructure. Elsevier Inc., USA (2004)Google Scholar
  7. 7.
    Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organization. International J. Supercomputer Applications 15(3) (2001)Google Scholar
  8. 8.
    Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International J. Supercomputer Application 11(2), 115–128 (1997)CrossRefGoogle Scholar
  9. 9.
    Tuecke, S., Czajkowski, K., Foster, I., et al.: Open Grid Services Infrastructure (OGSI) Version 1.0, Global Grid Forum Draft Recommendation (2003)Google Scholar
  10. 10.
    Foster, I., Kesselman, C., Nick, J., Tuecke, S.: Grid Services for Distributed System Integration. IEEE Computer Society 35(6), 37–46 (2002)Google Scholar
  11. 11.
    Foster, I., Frey, J., Graham, S., et al.: Modeling Stateful Resources with Web Services Version 1.1. Global Grid Forum Draft Recommendation (2004)Google Scholar
  12. 12.
    Dai, W.: Crypto++ – A Free C++ Library for Cryptography, Version 5.2.1 (2005), Available at
  13. 13.
    Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)Google Scholar
  14. 14.
    van Oorschot, P.C., Wiener, M.J.: Parallel Collision Search with Cryptanalytic Applications. J. Cryptology 12, 1–28 (1999)MATHCrossRefMathSciNetGoogle Scholar
  15. 15.
    Biham, E., Shamir, A.: Differential Cryptanalysis of the Full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Zhonghua Jiang
    • 1
    • 2
  • Dongdai Lin
    • 1
  • Lin Xu
    • 1
    • 2
  • Lei Lin
    • 1
    • 2
  1. 1.State Key Laboratory Information Security, Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.Graduate School of the Chinese Academy of SciencesBeijingChina

Personalised recommendations