2005
DOI: 10.1007/978-3-540-30574-3_23
|View full text |Cite
|
Sign up to set email alerts
|

CryptoGraphics: Secret Key Cryptography Using Graphics Cards

Abstract: We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by exploiting the ability for GPUs to simultaneously process large quantities of pixels, to offload symmetric key encryption from the main processor. We demonstrate the use of GPUs for applying the key stream when using stream ciphers. We also investigate the use of GPUs for block ciphers, discuss operations that make certain ciphers unsuitable for use with a GPU, and compare the performance of an OpenGL-based impl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 59 publications
(42 citation statements)
references
References 13 publications
0
42
0
Order By: Relevance
“…Therefore, encryption and decryption times of the header could be greatly reduced if only a subset of the confidential attributes is encrypted. Further reduction in the encryption and decryption times can be achieved using specialized graphic processors or external graphics cards [28]. Optimized programming and parallelization techniques can also be used to enhance the overall time performance.…”
Section: Time Performance Resultsmentioning
confidence: 99%
“…Therefore, encryption and decryption times of the header could be greatly reduced if only a subset of the confidential attributes is encrypted. Further reduction in the encryption and decryption times can be achieved using specialized graphic processors or external graphics cards [28]. Optimized programming and parallelization techniques can also be used to enhance the overall time performance.…”
Section: Time Performance Resultsmentioning
confidence: 99%
“…GPUs have now developed into a powerful, highly parallel computing platform that finds more and more interest outside graphics-processing applications. In cryptography so far mostly secretkey applications were implemented (see, e.g., [14] and the book [15]) while taking full advantage of GPUs for public-key cryptography remained a challenge [38].…”
Section: Review Of Gpus and Gpu Programmingmentioning
confidence: 99%
“…Many attempts have been made to use graphics processors for security applications, including cryptography [11,8], data carving [17], and intrusion detection [14,30,10,27,13]. In our previous work [30], we extended Snort to offload the string matching operations of the Snort IDS to the GPU, offering a three times speedup to the processing throughput compared to a CPU-only implementation.…”
Section: Related Workmentioning
confidence: 99%