Research Article
Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing
Algorithm 1
The strategy for MM algorithm.
Input: N: The number of available CPUs in the system. | Output: : The number of CPUs used for software encryption with AES-NI; | : The number of CPUs responsible for the processes of hardware invocation; | : The processes invoked for software encryption with AES-NI; | : The processes invoked for software encryption with AES-NI; | : The total number of active processes. | /∗ test for the maximum bandwidth with AES-NI in different CPU number, general the process number is | equal to the CPU number ∗/ | (1) for CPU number from 1 to N do | (2) calculate /∗ is the maximum bandwidth when the CPU number is i ∗/ | (3) end for | /∗ test for the maximum bandwidth with hardware in different CPU number and process number ∗/ | (4) for CPU number from 1 to N do | (5)for process number from 1 to 32 do | (6) calculate /∗ is the maximum bandwidth when the CPU number and | process number is i and j ∗/ | (7) end for | (8) end for | /∗ Calculate the max performance difference between AES-NI computing and hardware encryption ∗/ | (9) let maxdiff ←. | (10) for CPU number from 1 to N do | (11) for process number from 1 to 32 do | (12) ← (). | (13) if (maxdiff <) then | (14) maxdiff←. | (15)←i. | (16)←j. | (17)← (N-i). | (18)←. | (19)←(). | (20)end if | (21) end for | (22) end for |
|