Research Article

Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing

Algorithm 1

The strategy for MM algorithm.
Input: N: The number of available CPUs in the system.
Output: : The number of CPUs used for software encryption with AES-NI;
: The number of CPUs responsible for the processes of hardware invocation;
: The processes invoked for software encryption with AES-NI;
: The processes invoked for software encryption with AES-NI;
: The total number of active processes.
/∗ test for the maximum bandwidth with AES-NI in different CPU number, general the process number is
equal to the CPU number ∗/
(1) for CPU number from 1 to N do
(2) calculate /∗ is the maximum bandwidth when the CPU number is i ∗/
(3) end for
/∗ test for the maximum bandwidth with hardware in different CPU number and process number ∗/
(4) for CPU number from 1 to N do
(5)for process number from 1 to 32 do
(6) calculate /∗ is the maximum bandwidth when the CPU number and
process number is i and j ∗/
(7) end for
(8) end for
/∗ Calculate the max performance difference between AES-NI computing and hardware encryption ∗/
(9) let maxdiff .
(10) for CPU number from 1 to N do
(11) for process number from 1 to 32 do
(12) ().
(13) if (maxdiff <) then
(14) maxdiff.
(15)←i.
(16)←j.
(17) (N-i).
(18).
(19)().
(20)end if
(21) end for
(22) end for