Abstract
GPUs offer a tremendous amount of computational bandwidth that was until now largely unusable for cryptographic computations due to a lack of integer arithmetic and user-friendly programming APIs that provided direct access to the GPU’s computing resources. The latest generation of GPUs, which introduces integer/binary arithmetic, has been leveraged to create several implementations of the AES and DES symmetric key algorithms. Both conventional and bitsliced implementations are described that achieve data rates on the order of 3-30 Gbps from a single AMD HD 2900 XT graphics card, yielding speedups of 6-60x over equivalent implementations on high-performance CPUs.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Owens, J.D., Luebke, D., Govindaraju, N., Harris, M., Krüger, J., Lefohn, A.E., Purcell, T.J.: A survey of general-purpose computation on graphics hardware. Computer Graphics Forum 26(1), 80–113 (2007)
Cook, D., Keromytis, A.: CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security). Springer-Verlag New York, Inc., Secaucus (2006)
Yamanouchi, T.: AES Encryption and Decryption on the GPU. In: GPU Gems 3, Addison-Wesley Professional, Reading (2007)
Seidel, E.: Preparing tomorrow’s cryptography: Parallel computation via multiple processors, vector processing, and multi-cored chips. (Senior Honors Project, Lawrence University)
Fournier, J.J.A., Moore, S.W.: A vector approach to cryptography implementation. In: Safavi-Naini, R., Yung, M. (eds.) DRMTICS 2005. LNCS, vol. 3919, pp. 277–297. Springer, Heidelberg (2006)
Costigan, N., Scott, M.: Accelerating ssl using the vector processors in ibm’s cell broadband engine for sony’s playstation 3. Cryptology ePrint Archive, Report 2007/061(2007), http://eprint.iacr.org/
Doggett, M.: Xenos: Xbox 360 gpu. In: Game Developers Conference - Europe (2005), http://ati.amd.com/developer/eg05-xenos-doggett-final.pdf
Blythe, D.: The direct3d 10 system. In: SIGGRAPH 2006: ACM SIGGRAPH 2006 Papers, pp. 724–734. ACM Press, New York (2006)
Segal, M., Akeley, K.: Opengl 2.1 specification. Technical report, Silicon Graphics Computer Systems, Mountain View, CA, USA (2006)
McCool, M., Toit, S.D.: Metaprogramming GPUs with Sh. AK Peters Ltd (2004)
Buck, I., Foley, T., Horn, D., Sugerman, J., Fatahalian, K., Houston, M., Hanrahan, P.: Brook for gpus: stream computing on graphics hardware. In: SIGGRAPH 2004: ACM SIGGRAPH 2004 Papers, pp. 777–786. ACM Press, New York (2004)
NVIDIA Corporation: NVIDIA CUDA Programming Guide (2007)
Advanced Micro Devices: ATI CTM Technical Reference Manual (2006)
Microsoft Corporation: The DirectX Software Development Kit (2007)
Biham, E.: A fast new DES implementation in software. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 260–272. Springer, Heidelberg (1997)
National Institute of Standards and Technology: Data Encryption Standard (DES). U.S. Department of Commerce, FIPS pub. 46 (1977)
Kwan, M.: Bitsliced des s-box source code, http://www.darkside.com.au/bitslice/index.html
National Institute of Standards and Technology: Advanced Encryption Standard (AES). U.S. Department of Commerce, FIPS pub. 197 (2001)
Canright, D.: A very compact rijndael s-box. Technical Report NPS-MA-04-001, (Naval Postgraduate School)
Matsui, M.: How far can we go on the x64 processors? In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 341–358. Springer, Heidelberg (2006)
Dai, W.: Crypto++ benchmarks for amd64 processor, http://www.cryptopp.com/benchmarks-amd64.html
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer-Verlag New York, Inc., Secaucus (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, J., Goodman, J. (2007). Symmetric Key Cryptography on Modern Graphics Hardware. In: Kurosawa, K. (eds) Advances in Cryptology – ASIACRYPT 2007. ASIACRYPT 2007. Lecture Notes in Computer Science, vol 4833. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76900-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-76900-2_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76899-9
Online ISBN: 978-3-540-76900-2
eBook Packages: Computer ScienceComputer Science (R0)