Matching cryptographic computing resources to the predicted requirements for decrypting encrypted communications
Abstract:
Embodiments of the invention include a computer-implemented method that uses a processor to access cryptographic-function constraints associated with an encrypted message. Based on a determination that the cryptographic-function constraints do not include mandatory cryptographic computing resource requirements, first resource-scaling operations are performed that include an analysis of cryptographic metrics associated with a processor. The cryptographic metrics include information associated with the encrypted message, along with performance measurements of cryptographic functions performed by the processor. The cryptographic-function constraints and results of the analysis of the cryptographic metrics are used to determine cryptographic processing requirements of the encrypted message; and match the cryptographic processing requirements to selected ones of a set of cryptographic computing resources to identify a customized set of cryptographic computing resources matched to cryptographic processing requirements of the encrypted message. The customized set of cryptographic computing resources is used to perform customized cryptographic functions on the encrypted message.
Information query
Patent Agency Ranking
0/0