GPGPU Software Implementation of Authenticated Encryption Algorithm Minalpher

被引:0
|
作者
Kosugi, Makiko [1 ]
Satoh, Akashi [1 ]
机构
[1] Univ Electrocommun, Dept Commun Engn & Informat, Chofu, Tokyo, Japan
关键词
cryptographic software; hash function; CAESAR; authentication; AES-GCM; GPU;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Minalpher is an authenticated encryption algorithm submitted to CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) as a candidate of a new standard algorithm. Performance evaluation of Minalpher in various software and hardware have been made. Especially, the algorithm is suitable for high-speed hardware implementation by utilizing its parallel operating capability. Therefore, we implemented the high-speed Minalpher software on GPGPU (General Purpose Graphic Processing Unit) that provides massive parallel computing. Its performance is compared with Minalpher on CPU and a de-facto standard AES-GCM on GPGPU.
引用
收藏
页数:3
相关论文
共 50 条
  • [31] Parallel Implementation of an Evolutionary Algorithm for Function Minimization on a GPGPU
    Almeida Arrieta, Betrand J.
    Alvarado-Nava, Oscar
    Chable Martinez, Hilda M.
    Rodriguez-Martinez, Eduardo
    Zaragoza Martinez, Francisco Javier
    HIGH PERFORMANCE COMPUTER APPLICATIONS, 2016, 595 : 213 - 224
  • [32] SEAA: Secure and Efficient Authenticated Encryption Algorithm for Satellite Application
    Murtaza, Abid
    Pirzada, S. Jahanzeb Hussain
    Xu, Tongge
    Liu Jianwei
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (12): : 185 - 196
  • [33] Implementing Authenticated Encryption Algorithm MK-3 on FPGA
    Werner, Gordon
    Farris, Steven
    Kaminsky, Alan
    Kurdziel, Michael
    Lukowiak, Marcin
    Radziszowski, Stanislaw
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 1225 - 1230
  • [34] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [35] Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers
    Abbas, Amr
    Mostafa, Hassan
    Mohieldin, Ahmed Nader
    JOURNAL OF LOW POWER ELECTRONICS, 2019, 15 (01) : 104 - 114
  • [36] An Area-Optimized Serial Implementation of ICEPOLE Authenticated Encryption Schemes
    Tempelmeier, Michael
    De Santis, Fabrizio
    Kaps, Jens-Peter
    Sigl, Georg
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 49 - 54
  • [37] A Hardware-efficient Implementation of CLOC for On-Chip Authenticated Encryption
    Elmohr, Mahmoud A.
    Kumar, Sachin
    Khairallah, Mustafa
    Chattopadhyay, Anupam
    2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 311 - 315
  • [38] Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation
    Goudarzi, Dahmun
    Jean, Jeremy
    Kolbl, Stefan
    Peyrin, Thomas
    Rivain, Matthieu
    Sasaki, Yu
    Sim, Siang Meng
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 31 - 59
  • [39] The Emergence of Authenticated Encryption
    Rogaway, Phillip
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479
  • [40] Indifferentiable Authenticated Encryption
    Barbosa, Manuel
    Farshim, Pooya
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 187 - 220