Research Article
Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing
Algorithm 1
The strategy for MM algorithm.
| Input: N: The number of available CPUs in the system. | | Output: : The number of CPUs used for software encryption with AES-NI; | | : The number of CPUs responsible for the processes of hardware invocation; | | : The processes invoked for software encryption with AES-NI; | | : The processes invoked for software encryption with AES-NI; | | : The total number of active processes. | | /∗ test for the maximum bandwidth with AES-NI in different CPU number, general the process number is | | equal to the CPU number ∗/ | | (1) for CPU number from 1 to N do | | (2) calculate /∗ is the maximum bandwidth when the CPU number is i ∗/ | | (3) end for | | /∗ test for the maximum bandwidth with hardware in different CPU number and process number ∗/ | | (4) for CPU number from 1 to N do | | (5)for process number from 1 to 32 do | | (6) calculate /∗ is the maximum bandwidth when the CPU number and | | process number is i and j ∗/ | | (7) end for | | (8) end for | | /∗ Calculate the max performance difference between AES-NI computing and hardware encryption ∗/ | | (9) let maxdiff ←. | | (10) for CPU number from 1 to N do | | (11) for process number from 1 to 32 do | | (12) ← (). | | (13) if (maxdiff <) then | | (14) maxdiff←. | | (15)←i. | | (16)←j. | | (17)← (N-i). | | (18)←. | | (19)←(). | | (20)end if | | (21) end for | | (22) end for |
|