Title :
The Scalability of Secure Lock
Author :
Antosh, Cory J. ; Mullins, Barry E.
Author_Institution :
Dept of Electr. & Comput. Eng., Air Force Inst. of Technol., Patterson, CA
Abstract :
This paper investigates how well secure lock scales. Using a Java simulation, secure locks are generated for network sizes up to 5,000 nodes using prime number node identifiers up to 512 bits in length. The resulting message sizes as well as the amount of time and memory consumed in the secure lock generation process are used for comparison. The Java BigInteger class enables secure lock generation on a desktop PC, which requires less than five minutes of time to produce the largest secure locks. The simulation also demonstrates secure locks´ ability to exclude untrusted members of the network. It is found that as the number of recipients increases, the secure lock message size increases linearly, while the amount of time and system memory used to create the secure lock increase exponentially.
Keywords :
Java; security of data; Java BigInteger class; desktop PC; message sizes; secure lock generation process; Broadcasting; Communication effectiveness; Computational modeling; Costs; Cryptography; Data security; Distributed computing; Java; Military computing; Scalability;
Conference_Titel :
Performance, Computing and Communications Conference, 2008. IPCCC 2008. IEEE International
Conference_Location :
Austin, Texas
Print_ISBN :
978-1-4244-3368-1
Electronic_ISBN :
1097-2641
DOI :
10.1109/PCCC.2008.4745086