Skip to main content

2014 | OriginalPaper | Buchkapitel

8. Graphics Processing Units

verfasst von : Peter Schwabe

Erschienen in: Secure Smart Embedded Devices, Platforms and Applications

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter introduces graphics processing units (GPUs) for general-purpose computations. It describes the highly parallel architecture of modern GPUs, software-development toolchains to program them, and typical pitfalls and performance bottlenecks. Then it considers several applications of GPUs in information security, in particular in cryptography and cryptanalysis.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, and Bo-Yin Yang. Breaking ECC2K-130. Cryptology ePrint Archive, Report 2009/541, 2009. http://eprint.iacr.org/2009/541/. Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, and Bo-Yin Yang. Breaking ECC2K-130. Cryptology ePrint Archive, Report 2009/541, 2009. http://​eprint.​iacr.​org/​2009/​541/​.
7.
Zurück zum Zitat Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, and Bo-Yin Yang. ECC2K-130 on NVIDIA GPUs. In Guang Gong and Kishan Chand Gupta, editors, Progress in Cryptology - INDOCRYPT 2010, volume 6498 of LNCS, pp. 328–346. Springer, 2010. http://cryptojedi.org/papers/#gpuev1l. Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, and Bo-Yin Yang. ECC2K-130 on NVIDIA GPUs. In Guang Gong and Kishan Chand Gupta, editors, Progress in Cryptology - INDOCRYPT 2010, volume 6498 of LNCS, pp. 328–346. Springer, 2010. http://​cryptojedi.​org/​papers/​#gpuev1l.
8.
9.
Zurück zum Zitat Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, and Bo-Yin Yang. ECM on graphics cards. In Antoine Joux, editor, Advances in Cryptology - EUROCRYPT 2009, volume 5479 of LNCS, pp. 483–501. Springer, 2009. http://cr.yp.to/papers.html#gpuecm. Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, and Bo-Yin Yang. ECM on graphics cards. In Antoine Joux, editor, Advances in Cryptology - EUROCRYPT 2009, volume 5479 of LNCS, pp. 483–501. Springer, 2009. http://​cr.​yp.​to/​papers.​html#gpuecm.
17.
Zurück zum Zitat Marta Chinnici, Salvatore Cuomo, Maurizio Laporta, Alberto Pizzirani, and Silvio Migliori. CUDA based implementation of parallelized Pollard’s rho algorithm for ECDLP. In Final Workshop of Grid Projects, “Pon Ricerca 2000–2006, Avviso 1575”, 2009. http:///www.cresco.enea.it/Documenti/web/presentazioni/ProceedingsCatan% ia2009/7chinnici.pdf. Marta Chinnici, Salvatore Cuomo, Maurizio Laporta, Alberto Pizzirani, and Silvio Migliori. CUDA based implementation of parallelized Pollard’s rho algorithm for ECDLP. In Final Workshop of Grid Projects, “Pon Ricerca 2000–2006, Avviso 1575”, 2009. http://​/​www.​cresco.​enea.​it/​Documenti/​web/​presentazioni/​ProceedingsCatan​% ia2009/7chinnici.pdf.
19.
Zurück zum Zitat Aaron E. Cohen and Keshab K. Parhi. GPU accelerated elliptic curve cryptography in \(GF(2^m)\). In 53rd IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), pages 57–60. IEEE, 2010. Aaron E. Cohen and Keshab K. Parhi. GPU accelerated elliptic curve cryptography in \(GF(2^m)\). In 53rd IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), pages 57–60. IEEE, 2010.
21.
Zurück zum Zitat Debra L. Cook and Angelos D. Keromytis. CryptoGraphics: Exploiting Graphics Cards For Security, volume 20 of Advances in Information Security. Springer, 2006. Debra L. Cook and Angelos D. Keromytis. CryptoGraphics: Exploiting Graphics Cards For Security, volume 20 of Advances in Information Security. Springer, 2006.
29.
Zurück zum Zitat Owen Harrison and John Waldron. AES encryption implementation and analysis on commodity graphics processing units. In Pascal Paillier and Ingrid Verbauwhede, editors, Cryptographic Hardware and Embedded Systems - CHES 2007, volume 4727 of LNCS, pages 209–226. Springer, 2007. Owen Harrison and John Waldron. AES encryption implementation and analysis on commodity graphics processing units. In Pascal Paillier and Ingrid Verbauwhede, editors, Cryptographic Hardware and Embedded Systems - CHES 2007, volume 4727 of LNCS, pages 209–226. Springer, 2007.
30.
Zurück zum Zitat Owen Harrison and John Waldron. Practical symmetric key cryptography on modern graphics hardware. In USENIX Security Symposium, pages 195–209. Usenix Association, 2008. Owen Harrison and John Waldron. Practical symmetric key cryptography on modern graphics hardware. In USENIX Security Symposium, pages 195–209. Usenix Association, 2008.
31.
Zurück zum Zitat Owen Harrison and John Waldron. Efficient acceleration of asymmetric cryptography on graphics hardware. In Bart Preneel, editor, Progress in Cryptology - AFRICACRYPT 2009, volume 5580 of LNCS, pages 350–367. Springer, 2009. Owen Harrison and John Waldron. Efficient acceleration of asymmetric cryptography on graphics hardware. In Bart Preneel, editor, Progress in Cryptology - AFRICACRYPT 2009, volume 5580 of LNCS, pages 350–367. Springer, 2009.
32.
Zurück zum Zitat Jens Hermans, Frederik Vercauteren, and Bart Preneel. Speed records for NTRU. In Josef Pieprzyk, editor, Topics in Cryptology - CT-RSA 2010, volume 5985 of LNCS, pages 73–88. Springer, 2010. Jens Hermans, Frederik Vercauteren, and Bart Preneel. Speed records for NTRU. In Josef Pieprzyk, editor, Topics in Cryptology - CT-RSA 2010, volume 5985 of LNCS, pages 73–88. Springer, 2010.
37.
Zurück zum Zitat Emilia Käsper and Peter Schwabe. Faster and timing-attack resistant AES-GCM. In Christophe Clavier and Kris Gaj, editors, Cryptographic Hardware and Embedded Systems - CHES 2009, volume 5747 of LNCS, pp. 1–17. Springer, 2009. http://cryptojedi.org/papers/#aesbs. Emilia Käsper and Peter Schwabe. Faster and timing-attack resistant AES-GCM. In Christophe Clavier and Kris Gaj, editors, Cryptographic Hardware and Embedded Systems - CHES 2009, volume 5747 of LNCS, pp. 1–17. Springer, 2009. http://​cryptojedi.​org/​papers/​#aesbs.
41.
Zurück zum Zitat Robert Könighofer. A fast and cache-timing resistant implementation of the AES. In Tal Malkin, editor, Topics in Cryptology - CT-RSA 2008, volume 4964 of LNCS, pages 187–202. Springer, 2008. Robert Könighofer. A fast and cache-timing resistant implementation of the AES. In Tal Malkin, editor, Topics in Cryptology - CT-RSA 2008, volume 4964 of LNCS, pages 187–202. Springer, 2008.
52.
Zurück zum Zitat Dag Arne Osvik, Joppe W. Bos, Deian Stefan, and David Canright. Fast software AES encryption. In Seokhie Hong and Tetsu Iwata, editors,Fast Software Encryption, volume 6147 of LNCS, pages 75–93. Springer, 2010. Dag Arne Osvik, Joppe W. Bos, Deian Stefan, and David Canright. Fast software AES encryption. In Seokhie Hong and Tetsu Iwata, editors,Fast Software Encryption, volume 6147 of LNCS, pages 75–93. Springer, 2010.
55.
Zurück zum Zitat Robert Szerwinski and Tim Güneysu. Exploiting the power of GPUs for asymmetric cryptography. In Elisabeth Oswald and Pankaj Rohatgi, editors, Cryptographic Hardware and Embedded Systems -CHES 2008, volume 5154 of LNCS, pages 79–99. Springer, 2008. Robert Szerwinski and Tim Güneysu. Exploiting the power of GPUs for asymmetric cryptography. In Elisabeth Oswald and Pankaj Rohatgi, editors, Cryptographic Hardware and Embedded Systems -CHES 2008, volume 5154 of LNCS, pages 79–99. Springer, 2008.
58.
Zurück zum Zitat Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, and Sotiris Ioannidis. Gnort: High performance network intrusion detection using graphics processors. In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Recent Advances in Intrusion Detection, volume 5230 of LNCS, pp. 116–134. Springer, 2008. http://www.ics.forth.gr/_pdf/brochures/gnort.raid08.pdf. Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, and Sotiris Ioannidis. Gnort: High performance network intrusion detection using graphics processors. In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Recent Advances in Intrusion Detection, volume 5230 of LNCS, pp. 116–134. Springer, 2008. http://​www.​ics.​forth.​gr/​_​pdf/​brochures/​gnort.​raid08.​pdf.
60.
Zurück zum Zitat Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. GPU-assisted malware. In Jean-Yves Marion, Noam Rathaus, and Cliff Zou, editors, Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 2010. dcs.ics.forth.gr/Activities/papers/gpumalware.malware10.pdf. Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. GPU-assisted malware. In Jean-Yves Marion, Noam Rathaus, and Cliff Zou, editors, Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 2010. dcs.ics.forth.gr/Activities/papers/gpumalware.malware10.pdf.
63.
Zurück zum Zitat Jason Yang and James Goodman. Symmetric key cryptography on modern graphics hardware. In Kaoru Kurosawa, editor, Advances in Cryptology - ASIACRYPT 2007, volume 4833 of LNCS, pages 249–264. Springer, 2007. Jason Yang and James Goodman. Symmetric key cryptography on modern graphics hardware. In Kaoru Kurosawa, editor,  Advances in Cryptology - ASIACRYPT 2007, volume 4833 of LNCS, pages 249–264. Springer, 2007.
Metadaten
Titel
Graphics Processing Units
verfasst von
Peter Schwabe
Copyright-Jahr
2014
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-7915-4_8