Advertisement

A Low-Cost, High-Performance Implementation of RSA Algorithm Using GPGPU

  • P. S. Sasaank Srivatsa
  • P. V. R. R. Bhogendra Rao
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 755)

Abstract

Information security has been of great use in various civilian and defence domains. However, the arduous procedures involved in securely establishing a common key lead to asymmetric-key encryption. The high computational needs of asymmetric-key encryption process made them impractical to be used for real-world applications. The proliferation of low-cost, high-performance computing through GPGPUs made many applications with high-performance requirements feasible to implement and use in real-world applications. A successful attempt has been made to implement RSA algorithm using GPGPU and the results are presented in this paper.

Keywords

Parallel and distributed computing Heterogeneous computing GPGPU computing OpenCL Asymmetric-key encryption 

References

  1. 1.
    Aaftab M.: The OpenCL C Specification, Version 2.0. (2014)Google Scholar
  2. 2.
    Amdahl, G.M.: Validity of the Single-Processor Approach to Achieving Large-Scale Computing Capabilities. In: Proceedings of the American Federation of Information Processing Societies Conference, AFIPS Press, pp. 483–485 (1967)Google Scholar
  3. 3.
    Bellare, M.: Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. Springer, Berlin Heidelberg (2000)zbMATHGoogle Scholar
  4. 4.
    Christof, P., Jan, P.: Introduction to Public-Key Cryptography, Chapter 6 of Understanding Cryptography. A Textbook for Students and Practitioners. Springer (2009)Google Scholar
  5. 5.
  6. 6.
    Delfs, H., Knebl, H.: Symmetric-key Encryption. Introduction to Cryptography: Principles and Applications. Springer (2007)Google Scholar
  7. 7.
    Fung J., Mann S.: Using multiple graphics cards as a general purpose parallel computer: applications to computer vision. In: Proceedings of the 17th International Conference on Pattern Recognition (ICPR2004), vol. 1, pp. 805–808. Cambridge, United Kingdom (2004)Google Scholar
  8. 8.
    Howes, L.: The OpenCL Specification Version:2.1 Document Revision:23. Khronos OpenCL Working Group (2015)Google Scholar
  9. 9.
    Hoffman, A.R., et al.: Supercomputers: Directions in Technology and Applications, pp. 35–47. National Academies (1990)Google Scholar
  10. 10.
    Hwu, W., Keutzer, K., Mattson, T.G.: The concurrency challenge. IEEE Design Test Comput. 25(4), 312–320 (2008)CrossRefGoogle Scholar
  11. 11.
    Information Security Resources. SANS Institute (2014). https://www.sans.org/security-resources/
  12. 12.
    Introduction to OpenCL Programming 201005, pp. 89–90. AMD (2017)Google Scholar
  13. 13.
    Srinivas, J.V.S., Bhogendra Rao, P.V.R.R., Kamakshi Prasad, V.: Parallel implementation of back propagation on master slave architecture. In: Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007)Google Scholar
  14. 14.
    OpenCL C PROGRAMMING GUIDE, Khronos Group (2013)Google Scholar
  15. 15.
    Conformant Companies. Khronos Group (2015)Google Scholar
  16. 16.
    Kchlin W.: Public key encryption, ACM SIGSAM Bulletin, pp. 69–73 (1987)Google Scholar
  17. 17.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography (1997)Google Scholar
  18. 18.
    Reinders, J.: Understanding task and data parallelism, ZDNet (2017)Google Scholar
  19. 19.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefGoogle Scholar
  20. 20.
  21. 21.
    Stone, J.E., David, G., Guochin, S.: OpenCL: a parallel programming standard for heterogeneous computing systems. Comput. Sci. Eng. 12, 66–73 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • P. S. Sasaank Srivatsa
    • 1
  • P. V. R. R. Bhogendra Rao
    • 2
  1. 1.Keshav Memorial Institute of TechnologyHyderabadIndia
  2. 2.Defence Research and Development LaboratoryHyderabadIndia

Personalised recommendations