Advertisement

Accelerating Image Encryption with AES Using GPU: A Quantitative Analysis

  • Aryan Saxena
  • Vatsal Agrawal
  • Rajdeepa Chakrabarty
  • Shubhjeet Singh
  • J. Saira BanuEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 941)

Abstract

From military imaging to sharing private pictures, confidentiality, integrity and authentication of images play an important role in the Internet of modern world. AES is currently one of the most famous symmetric cryptographic algorithms. Performing encryption/decryption of high-resolution images with AES is highly computation-intensive and time-consuming due to their large sizes and the underlying complexity of AES algorithm. Earlier increasing cryptographic complexity meant an increase in the processing time for encryption as well as decryption. Now, with the rise of the powerful GPUs containing thousands of high-performance and efficient cores and with the evolvement of GPU computing, the processing time has been reduced to a fraction of the time it used to take earlier. This paper presents a parallel implementation of AES using NVIDIA CUDA and OpenCV to encrypt images rapidly. We achieved an average speed up of four times on GPU as compared to CPU-only.

Keywords

AES GPU Image encryption OpenCV CUDA Speedup 

References

  1. 1.
    Nagendra, M., Sekhar, M.C.: Performance improvement of advanced encryption algorithm using parallel computation. Int. J. Softw. Eng. Appl. 8(2), 287–296 (2014)Google Scholar
  2. 2.
    Elkabbany, G.F., Aslan, H.K., Rasslan, M.N.: A design of a fast parallel- pipelined implementation of AES: advanced encryption standard. arXiv preprint arXiv:1501.01427 (2015)
  3. 3.
    Daniel, T.R., Stratulat, M.: AES on GPU using CUDA. In: 2010 European Conference for the Applied Mathematics & Informatics. World Scientific and Engineering Academy and Society Press (2010)Google Scholar
  4. 4.
    Sowmiya, S., Tresa, I.M., Chakkaravarthy, A.P.: Pixel based image encryption using magic square. In: 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), pp. 1–4. IEEE (2017)Google Scholar
  5. 5.
    Feng, X., Tian, X., Xia, S.: A novel image encryption algorithm based on fractional fourier transform and magic cube rotation. In: 2012 4th International Congress on Image and Signal Processing (CISP), vol. 2, pp. 1008–1011. IEEE (2012)Google Scholar
  6. 6.
    Ren, S., Gao, C., Dai, Q., Fei, X.: Attack to an image encryption algorithm based on improved chaotic cat maps. In: 2012 3rd International Congress on Image and Signal Processing (CISP), vol. 2, pp. 533–536. IEEE (2010)Google Scholar
  7. 7.
    Lei, Z., Li, L., Xianwei, G.: Design and realization of image encryption system based on SMS4 commercial cipher algorithm. In: 2012 4th International Congress on Image and Signal Processing (CISP), vol. 2, pp. 741–744. IEEE (2012)Google Scholar
  8. 8.
    Li, Q., Zhong, C., Zhao, K., Mei, X., Chu, X.: Implementation and analysis of AES encryption on GPU. In: 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), pp. 843–848. IEEE (2012)Google Scholar
  9. 9.
    Abdelrahman, A.A., Fouad, M.M., Dahshan, H., Mousa, A.M.: High performance CUDA AES implementation: a quantitative performance analysis approach. In: Computing Conference 2017, pp. 1077–1085. IEEE (2017)Google Scholar
  10. 10.
    Khan, A.H., Al-Mouhamed, M.A., Almousa, A., Fatayar, A., Ibrahim, A.R., Siddiqui, A.J.: Aes-128 ECB encryption on GPU and effects of input plaintext patterns on performance. In: 2014 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD, pp. 1–6. IEEE (2014)Google Scholar
  11. 11.
    Patchappen, M., Yassin, Y.M., Karuppiah, E.K.: Batch processing of multi-variant AES cipher with GPU. In: 2015 Second International Conference on Computing Technology and Information Management (ICCTIM), pp. 32–36. IEEE (2015)Google Scholar
  12. 12.
    Ma, J., Chen, X., Xu, R., Shi, J.: Implementation and evaluation of different parallel designs of AES using CUDA. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 606–614. IEEE (2017)Google Scholar
  13. 13.
    Subramanyan, B., Chhabria, V.M., Sankar Babu, T.G.: Image encryption based on AES key expansion. In: 2011 Second International Conference on Emerging Applications of Information Technology (2011)Google Scholar
  14. 14.
    Zhang, Y.: Test and verification of AES used for image encryption. Published online: 12 January 2018. 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany, part of Springer Nature (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.School of Computer Science and Engineering (SCOPE)Vellore Institute of TechnologyVelloreIndia

Personalised recommendations