2020
DOI: 10.3390/app10113711
|View full text |Cite
|
Sign up to set email alerts
|

Highly Efficient Implementation of Block Ciphers on Graphic Processing Units for Massively Large Data

Abstract: With the advent of IoT and Cloud computing service technology, the size of user data to be managed and file data to be transmitted has been significantly increased. To protect users’ personal information, it is necessary to encrypt it in secure and efficient way. Since servers handling a number of clients or IoT devices have to encrypt a large amount of data without compromising service capabilities in real-time, Graphic Processing Units (GPUs) have been considered as a proper candidate for a crypto accelerato… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…Researches that optimize the AES encryption process on GPUs have still being studied. Recently, various optimization methods and results of AES using GPUs have been presented in [4], [5] and [6].…”
Section: Related Workmentioning
confidence: 99%
“…Researches that optimize the AES encryption process on GPUs have still being studied. Recently, various optimization methods and results of AES using GPUs have been presented in [4], [5] and [6].…”
Section: Related Workmentioning
confidence: 99%
“…Algorithm 2 is a summary of θ process. Algorithm 2 proposes a calculation method for one lane of the initial 1: χ and ι Process state[0] 2: asm("{\n\t" 3: ".reg.b64 value; \n\t" Register Setting 4: ".not.b64 value, %2;\n\t" NOT Operation : value = ∼%6 5: ".and.b64 value, value, %3;\n\t" AND Operation : value &= %3 6: ".xor b64 %0, value, %1; \n\t" χ process END 7: ".xor b64 %0, %0, %4; }\n\t" iota process 8: :"=l"(state[0]) Output Parameter : %0 = state[0] 9: :"l"(Buf f er[0]),"l"(Buf f er [6]),"l"(Buf f er [12]), "l"(RC[round]) 10: Input Parameters : Buf f er[0], Buf f er [6], Buf f er [12] and RC[round] 11: ); θ process. That is, a value used repeatedly in the θ process are calculated using lanes belonging to the same sheet.…”
Section: Optimization Of Sha-3 Internal Processmentioning
confidence: 99%
“…By utilizing the characteristics of warp actively, terabit throughput was proposed for various block ciphers. In [14], CHAM and LEA were optimized in GPU environment. Terabit throughput was achieved by integrating and resolving various memory problems that could occur in the GPU environment.…”
Section: Related Workmentioning
confidence: 99%