scholarly journals On Energy Optimization in Cryptographic Hash Functions and Symmetric Key Protocols

Author(s):  
Swapnoneel Roy ◽  
Priyanka Harish ◽  
Raghu Talluri

In this work we study the energy consumption by various modern secured hash functions (MD2, MD5, SHA-1, and SHA-2) and modern symmetric key encryption protocols (Blowfish, DES, 3DES, and AES) from the algorithmic perspective. We identify various parameters that moderate energy consumption of these hashes and protocols. Our work is directed towards redesigning or modifying these algorithms to make them consume lesser energy. As a first step, we try to determine the applicability of the asymptotic energy complexity model by Roy et. al. on these hashes and protocols. Specifically, we try to observe whether parallelizing the access of blocks of data in these algorithms reduces their energy consumption based on the energy model. Our results confirm the applicability of the energy model on these hashes and protocols. Our work is motivated by the relevance and importance of cryptographic hashes and symmetric key protocols for modern ICT (Information and Communication Technology), and ICT enabled industry to keep them protected from dynamically changing threat scenarios. Hence the design of more energy efficient hashes and protocols will definitely contribute in reducing the ICT energy consumption that is continuously increasing.

Author(s):  
Swapnoneel Roy ◽  
Sanjay P. Ahuja ◽  
Priyanka D. Harish ◽  
S. Raghu Talluri

In this chapter, we study the energy consumption by various modern cryptographic protocols for the cloud from the algorithmic perspective. The two categories of protocols we consider are (1) hash functions and (2) symmetric key encryption protocols. We identify various parameters that moderate energy consumption of these hashes and protocols. Our work is directed towards redesigning or modifying these algorithms to make them consume lesser energy. As a first step, we try to determine the applicability of the asymptotic energy complexity model by Roy on these hashes and protocols. Specifically, we try to observe whether parallelizing the access of blocks of data in these algorithms reduces their energy consumption based on the energy model. Our results confirm the applicability of the energy model on these hashes and protocols. Our work is motivated by the importance of cryptographic hashes and symmetric key protocols for the cloud. Hence the design of more energy efficient hashes and protocols will contribute in reducing the cloud energy consumption that is continuously increasing.


Author(s):  
Rodrigues Ryan Sebastian

In the last couple of decades, we have witnessed major technological changes that have transformed the way we live, work, and interact with one another. One of the major technology facilitator in charge of for this remarkable transformation in our global society is the deployment and use of Information and Communication Technology (ICT) equipment. In fact, today with the current pandemic going on ICT has become highly integrated in our society that includes the dependence on ICT of various sectors, such as business, transportation, education, and the economy to the point that we now almost completely depend on it. In the last few years, the energy consumption resulting from the usage of ICT equipment and its impact on the environment have resulted in a lot of interests among researchers, designers, manufacturers, policy makers, and educators. Hence energy efficiency has become important bar that is being increasingly used to evaluate energy consumption of devices, hardware and various networking architectures, systems, and communication protocols. I will cover the same and present some of the motivations driving the need for energy-efficient communications in this paper. There have been a lot of approaches to minimize energy consumption by communication devices, protocols, networks, end-user systems, and data centers and I will describe and discuss some of the recent techniques and solutions that have been proposed to minimize energy consumption, also look to the future of networking from a new angle, where energy efficiency and environmental concerns are viewed as fundamental design criteria and forces that need to be harnessed to continually create more powerful networking equipment.


Author(s):  
Jungwoo Ryoo ◽  
Young Choi

Due to increased awareness of human’s adverse effect on the environment, many new technologies to mitigate the environmental damage are under development. Although innovative, many of these technologies are often developed in isolation and consequently incompatible with each other. From the viewpoint of Systems Engineering, this presents an enormous challenge since compatibility among different elements of a system is crucial in achieving an optimal operational state that minimizes energy consumption. Therefore, standardization in the form of protocols is a key to accomplishing the goal of green Information and Communication Technology (ICT). In this chapter, the authors examine the existing green ICT technologies and their protocols to identify both obvious and subtle strengths and weaknesses. Particularly, the authors scrutinize the interoperability of the existing green ICT protocols and provide insights on how to improve the status quo. In addition, information on emerging governing bodies of green ICT protocols is provided.


2018 ◽  
Vol 7 (3) ◽  
pp. 1263
Author(s):  
Shah Murtaza Rashid Al. Masud ◽  
Asmidar Abu Bakar ◽  
Salman Yussof

Due to lack of deployment of information and communication technology (ICT) for real-time pilgrims' health monitoring during Hajj, many pilgrims left untreated, get lost and suffer from severe health problems which sometimes end with injury, traum and even death. WBAN is an emergent healthcare technology and can be deployed at Hajj ritual sites for pilgrims' health monitoring. WBANs body coordinator or gateway as an aggregator collect data from body nodes or sensors, store them and then forward to the healthcare stations for analyzing the data through outer-WBAN communications. Currently, most of the existing research works focused on intra-WBAN communications while the technical issues, problems, opportunities and standard correlated to outer-WBAN are not well discussed and mentioned. Since, medium access control (MAC) protocol is responsible for channel access, lower delay, and energy efficient transmission of data packets. Therefore, designing of an efficient and reliable MAC protocol is the earnest research demand to alleviate the aforementioned obstacle. In this research, a feasibility study has been completed to identify the problem and a proposal has been made to develop a suitable MAC protocol for outer-WBAN communication for pilgrims’ health monitoring during Hajj.  


2012 ◽  
Vol 524-527 ◽  
pp. 2545-2548
Author(s):  
Jian Hua Shen ◽  
Xin Ran Shi ◽  
Ji Xiang Lin ◽  
Jian Chen

Due to the fast growth of energy consumption in modern industry especially the Information and Communication Technology (ICT) society, many attentions are focused on better energy efficient solutions. In this paper, we provide an implementation perspective survey on employed optical network technologies’ power consumption features. We investigate major techniques of current optical network and corresponding energy consumptions. Some promising techniques are proposed including burst switching, multiple granularity traffic grooming, unified control plane and Green PON to achieve energy efficiency.


2011 ◽  
pp. 405-417
Author(s):  
Jungwoo Ryoo ◽  
Young Choi

Due to increased awareness of human’s adverse effect on the environment, many new technologies to mitigate the environmental damage are under development. Although innovative, many of these technologies are often developed in isolation and consequently incompatible with each other. From the viewpoint of Systems Engineering, this presents an enormous challenge since compatibility among different elements of a system is crucial in achieving an optimal operational state that minimizes energy consumption. Therefore, standardization in the form of protocols is a key to accomplishing the goal of green Information and Communication Technology (ICT). In this chapter, the authors examine the existing green ICT technologies and their protocols to identify both obvious and subtle strengths and weaknesses. Particularly, the authors scrutinize the interoperability of the existing green ICT protocols and provide insights on how to improve the status quo. In addition, information on emerging governing bodies of green ICT protocols is provided.


Sign in / Sign up

Export Citation Format

Share Document