Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 2, Issue. 8, August 2013, pg.115 – 119 RESEARCH ARTICLE © 2013, IJCSMC All Rights Reserved 115 Parallel Encryption Technique Combined With Secure Single Sign-On Mechanism for Distributed Computer Networks R. Suganya 1 , A.K. Sathiya Bama 2 1 Research Scholar, Department Of Computer Science, Vivekanandha College, Tiruchengode, Tamil Nadu, India 2 Assistant Professor, Department Of Computer Application, Vivekanandha College, Tiruchengode, Tamil Nadu, India 1 suganya2121@gmail.com; 2 ask_jnf@yahoo.com Abstract— These security-enhanced communication tools in a wide-area Globus test bed that we are constructing, called GUSTO (Guidance Utilizing Stable Timing Oscillator). This deployment will allow large- scale application experiments and hence provide feedback on how our security mechanisms work in practical situations. It seems certain that encryption performance will be a bottleneck in many situations. Hence, we will experiment with various performance enhancement techniques, including specialized protocols, parallel encryption algorithms combined with secure single sign mechanism, and use of dedicated encryption processors. Another interesting direction for further work will be to investigate the feasibility of using the Meta computing Directory Service to determine when secure communication mechanisms must be employed, for example because communication occurs over insecure network connections. Clearly one issue that will be important to address in this context is the authenticity of resource database entries. Key Terms: - Communication; Dos; Key Distribution; Mobile Devices; User Identification I. INTRODUCTION The exercise of high-performance networks to pair geographically distributed supercomputers, database systems, generalized scientific instruments, etc., is enabling novel applications in areas such as collaborative engineering, computer-enhanced instrumentation, and ultra-large-scale scientific simulation. However, widespread use of such applications depends crucially on the availability of appropriate security mechanisms. Owners of resources require authentication mechanisms to protect themselves against malicious users. Users of resources may also demand authentication of resources, in order to protect themselves against spoofing by malicious resource providers. Users will often need to ensure that the integrity and confidentiality of data communicated between resources are not compromised, particularly when communication occurs over public networks. Other forms of attack can also be of concern, such as denial of service attacks against applications that use supercomputers to control remote devices. The task of meeting these security requirements is complicated by the distinctive program structures, computing environments, and performance requirements encountered in high-performance systems. Traditional