Research Article

Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing

Table 2

Parameters for MM algorithm.

ParameterDescription

NThe number of available CPUs in the system
The number of CPUs used for software encryption with AES-NI
The number of CPUs responsible for the processes of hardware invocation
The processes invoked for software encryption with AES-NI
The processes invoked for hardware encryption
The total number of active processes
The maximum bandwidth with hardware encryption, at the condition of i CPUs and j processes, and completely loaded
The maximum bandwidth with software encryption, at the condition of i CPUs and i processes, and completely loaded
The bandwidth difference between hardware encryption and software encryption ()