Skip to main content

2018 | OriginalPaper | Buchkapitel

Parallel Programming in Cyber-Physical Systems

verfasst von : Sandro Bartolini, Biagio Peccerillo

Erschienen in: Cyber-Physical Systems Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The growing diffusion of heterogeneous Cyber-Physical Systems (CPSs) poses a problem of security. The employment of cryptographic strategies and techniques is a fundamental part in the attempt of finding a solution to it. Cryptographic algorithms, however, need to increase their security level due to the growing computational power in the hands of potential attackers. To avoid a consequent performance worsening and keep CPSs functioning and secure, these cryptographic techniques must be implemented so to exploit the aggregate computational power that modern parallel architectures provide. In this chapter we investigate the possibility to parallelize two very common basic operations in cryptography: modular exponentiation and Karatsuba multiplication. For the former, we propose two different techniques (m-ary and exponent slicing) that reduce calculation time of 30/40%. For the latter, we show various implementations of a three-thread parallelization scheme that provides up to 60% better performance with respect to a sequential implementation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
Simultaneous multi-threading.
 
2
M0 = 1 for every non-zero M, and M1 = M.
 
Literatur
1.
Zurück zum Zitat G.R. Blakley, A computer algorithm for the product AB modulo M. IEEE Trans. Comput. 32(5), 497–500 (1983)CrossRef G.R. Blakley, A computer algorithm for the product AB modulo M. IEEE Trans. Comput. 32(5), 497–500 (1983)CrossRef
2.
Zurück zum Zitat B. Dally, Efficiency and parallelism: the challenges of future computing. Tech. rep., Nvidia Research, Stanford University, 2014 B. Dally, Efficiency and parallelism: the challenges of future computing. Tech. rep., Nvidia Research, Stanford University, 2014
3.
Zurück zum Zitat Q.D. Elaine Barker, Recommendation for key management, part 3: application-specific key management guidance. Tech. rep., National Institute of Standards and Technology (NIST), 2015 Q.D. Elaine Barker, Recommendation for key management, part 3: application-specific key management guidance. Tech. rep., National Institute of Standards and Technology (NIST), 2015
4.
Zurück zum Zitat J.L. Hennessy, D.A. Patterson, Computer Architecture, Fifth Edition: A Quantitative Approach, 5th edn. (Morgan Kaufmann Publishers Inc., San Francisco, 2011) J.L. Hennessy, D.A. Patterson, Computer Architecture, Fifth Edition: A Quantitative Approach, 5th edn. (Morgan Kaufmann Publishers Inc., San Francisco, 2011)
5.
Zurück zum Zitat ISO, ISO/IEC 14882:2011 – Information technology – Programming languages – C++ (Standard, International Organization for Standardization, Geneva, 2011) ISO, ISO/IEC 14882:2011 – Information technology – Programming languages – C++ (Standard, International Organization for Standardization, Geneva, 2011)
6.
Zurück zum Zitat J. Kelsey, B. Schneier, D. Wagner, C. Hall, Side channel cryptanalysis of product ciphers, in Proceedings of the 5th European Symposium on Research in Computer Security, ESORICS ’98 (Springer, London, 1998), pp 97–110. http://dl.acm.org/citation.cfm?id=646647.699203 J. Kelsey, B. Schneier, D. Wagner, C. Hall, Side channel cryptanalysis of product ciphers, in Proceedings of the 5th European Symposium on Research in Computer Security, ESORICS ’98 (Springer, London, 1998), pp 97–110. http://​dl.​acm.​org/​citation.​cfm?​id=​646647.​699203
7.
Zurück zum Zitat D.E. Knuth, The Art of Computer Programming: Seminumerical Algorithms, vol. 2, 3rd edn. (Addison-Wesley Longman Publishing Co., Inc., Boston, 1997) D.E. Knuth, The Art of Computer Programming: Seminumerical Algorithms, vol. 2, 3rd edn. (Addison-Wesley Longman Publishing Co., Inc., Boston, 1997)
8.
Zurück zum Zitat Ç.K. Koç, High-speed RSA implementation. Tech. rep., RSA Laboratories, 1994 Ç.K. Koç, High-speed RSA implementation. Tech. rep., RSA Laboratories, 1994
9.
Zurück zum Zitat P.C. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’96 (Springer, London, 1996), pp. 104–113. http://dl.acm.org/citation.cfm?id=646761.706156MATH P.C. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’96 (Springer, London, 1996), pp. 104–113. http://​dl.​acm.​org/​citation.​cfm?​id=​646761.​706156MATH
10.
Zurück zum Zitat P. Lara, F. Borges, R. Portugal, N. Nedjah, Parallel modular exponentiation using load balancing without precomputation. J. Comput. Syst. Sci. 78(2), 575–582 (2012)MathSciNetCrossRef P. Lara, F. Borges, R. Portugal, N. Nedjah, Parallel modular exponentiation using load balancing without precomputation. J. Comput. Syst. Sci. 78(2), 575–582 (2012)MathSciNetCrossRef
11.
Zurück zum Zitat G. Loukas, Cyber-Physical Attacks: A Growing Invisible Threat, 1st edn. (Butterworth-Heinemann, Newton, 2015) G. Loukas, Cyber-Physical Attacks: A Growing Invisible Threat, 1st edn. (Butterworth-Heinemann, Newton, 2015)
12.
Zurück zum Zitat M.M. Michael, M.L. Scott, Simple, fast, and practical non-blocking and blocking concurrent queue algorithms, in Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, PODC ’96 (ACM, New York, 1996), pp. 267–275 M.M. Michael, M.L. Scott, Simple, fast, and practical non-blocking and blocking concurrent queue algorithms, in Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, PODC ’96 (ACM, New York, 1996), pp. 267–275
13.
14.
Zurück zum Zitat D. Page, Theoretical use of cache memory as a cryptanalytic side-channel, 2002 D. Page, Theoretical use of cache memory as a cryptanalytic side-channel, 2002
15.
Zurück zum Zitat R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRef R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRef
16.
Zurück zum Zitat H. Sutter, The free lunch is over: a fundamental turn toward concurrency in software. Dr Dobb’s J. 30(3), 202–210 (2005) H. Sutter, The free lunch is over: a fundamental turn toward concurrency in software. Dr Dobb’s J. 30(3), 202–210 (2005)
18.
Zurück zum Zitat D.M. Tullsen, S.J. Eggers, H.M. Levy, Simultaneous multithreading: maximizing on-chip parallelism, in Proceedings of the 22nd Annual International Symposium on Computer Architecture, ISCA ’95 (ACM, New York, 1995), pp. 392–403 D.M. Tullsen, S.J. Eggers, H.M. Levy, Simultaneous multithreading: maximizing on-chip parallelism, in Proceedings of the 22nd Annual International Symposium on Computer Architecture, ISCA ’95 (ACM, New York, 1995), pp. 392–403
19.
Zurück zum Zitat M. Wolf, D. Serpanos, Safety and security in cyber-physical systems and internet-of-things systems. Proc. IEEE 106(1), 9–20 (2018)CrossRef M. Wolf, D. Serpanos, Safety and security in cyber-physical systems and internet-of-things systems. Proc. IEEE 106(1), 9–20 (2018)CrossRef
Metadaten
Titel
Parallel Programming in Cyber-Physical Systems
verfasst von
Sandro Bartolini
Biagio Peccerillo
Copyright-Jahr
2018
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-319-98935-8_6