In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Advanced Encryption Standard (AES). The performance of these im-plementations is better than a conventional CPU based implementation by a factor of 40x. These implementations scale linearly with a growing input size as well as the number of computational cores available on the GPU. We further analyze the security of these implementations against standard attacks on implementations (also known as side channel attacks), specifically timing attacks. Based on our analysis we also present versions of these encryption schemes that are resistant to such attacks. Using an Nvidia GTX280 we are able to obtain encryption speeds of up to 32GBps. 1
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
AbstractGraphics processing units have proved its capability for general purpose computing in many r...
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is ...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
International audienceIn this work we study the feasibility of high-bandwidth, secure communications...
Graphical Processor Units (GPUs) offer a high level of processing power due to its high density of ...
The advancements in computing have led to tremendous increase in the amount of data being generated ...
International audienceData Confidentiality (DC) is considered one of the most important security ser...
Abstract. This paper presents new software speed records for AES-128 encryption for architectures at...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
AbstractGraphics processing units have proved its capability for general purpose computing in many r...
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is ...
Graphics processing units (GPUs) are specially designed for parallel applications and perform parall...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
International audienceIn this work we study the feasibility of high-bandwidth, secure communications...
Graphical Processor Units (GPUs) offer a high level of processing power due to its high density of ...
The advancements in computing have led to tremendous increase in the amount of data being generated ...
International audienceData Confidentiality (DC) is considered one of the most important security ser...
Abstract. This paper presents new software speed records for AES-128 encryption for architectures at...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
AbstractGraphics processing units have proved its capability for general purpose computing in many r...
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is ...