Skip to main content
Top

2017 | OriginalPaper | Chapter

A Comparison of Computer-Based Technologies Suitable for Cryptographic Attacks

Authors : Víctor Gayoso Martínez, Luis Hernández Encinas, Agustin Martín Muñoz, Óscar Martínez-Graullera, Javier Villazón-Terrazas

Published in: International Joint Conference SOCO’16-CISIS’16-ICEUTE’16

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Developed initially for tasks related to computer graphics, GPUs are increasingly being used for general purpose processing, including scientific and engineering applications. In this contribution, we have analysed the performance of three graphics cards that belong to the parallel computing CUDA platform with two C++ and Java multi-threading implementations, using as an example of computation a brute-force attack on KeeLoq, one of the best known remote keyless entry applications. As it was expected, these implementations are not able to break algorithms with 64-bit keys, but the results allow us to provide valuable information regarding the compared capabilities of the tested platforms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kasper, T.: Security Analysis of Pervasive Wireless Devices - Physical and Protocol Attacks in Practice Ruhr-University Bochum, Germany (2011) Kasper, T.: Security Analysis of Pervasive Wireless Devices - Physical and Protocol Attacks in Practice Ruhr-University Bochum, Germany (2011)
4.
go back to reference Mittal, S., Vetter, J.S.: A survey of methods for analyzing and improving GPU energy efficiency. ACM Computi. Surv. 47(2), 1–23 (2014) Mittal, S., Vetter, J.S.: A survey of methods for analyzing and improving GPU energy efficiency. ACM Computi. Surv. 47(2), 1–23 (2014)
Metadata
Title
A Comparison of Computer-Based Technologies Suitable for Cryptographic Attacks
Authors
Víctor Gayoso Martínez
Luis Hernández Encinas
Agustin Martín Muñoz
Óscar Martínez-Graullera
Javier Villazón-Terrazas
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-47364-2_60

Premium Partner