Accelerating private-key cryptography via multithreading on symmetric multiprocessors

被引:11
|
作者
Dongara, P
Vijaykumar, TN
机构
关键词
D O I
10.1109/ISPASS.2003.1190233
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today's computers. Despite steady improvements in microprocessor and system performance, private-key cipher implementations continue to be slow. Irrespective of the cipher used, the main reason for the low performance is lack of parallelism, which fundamentally comes from encryption modes such as the Cipher Block Chaining (CBC) mode. In CBC, each plaintext block is XOR'ed with the previous ciphertext block and then encrypted, essentially inducing a tight recurrence through the ciphertext blocks. To deliver high performance while maintaining high level of security assurance in real systems, the cryptography community has proposed Interleaved Cipher Block Chaining (ICBC) mode. In four-way interleaved chaining, the first, fifth, and every fourth block thereafter are encrypted in CBC mode; the second, sixth, and ever), fourth block thereafter are encrypted as another stream, and so on. Thus, interleaved chaining loosens the recurrence imposed by CBC, enabling the multiple encryption streams to be overlapped. The number of interleaved chains can be chosen to balance performance and adequate chaining to get good data diffusion. While ICBC was originally proposed to improve hardware encryption rates by employing multiple encryption chips in parallel, this is the first paper to evaluate ICBC via multithreading commonly-used ciphers on a symmetric multiprocessor (SMP). ICBC allows exploiting the full processing power of SMPs, which spend many cycles in cryptographic processing as medium-scale servers today, and will do so as chip-multiprocessor clients in the future. Using the Wisconsin Wind Tunnel II, we show that our multithreaded ciphers achieve encryption rates of 92 Mbytes/s on a 16-processor SMP at 1 GHz, reaching a factor of almost 10 improvement over a uniprocessor which achieves 9 Mbytes/s.
引用
收藏
页码:58 / 69
页数:12
相关论文
共 50 条
  • [1] Forward-security in private-key cryptography
    Bellare, M
    Yee, B
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 1 - 18
  • [2] Distributed Private-Key Generators for Identity-Based Cryptography
    Kate, Aniket
    Goldberg, Ian
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 436 - 453
  • [3] From Minicrypt to Obfustopia via Private-Key Functional Encryption
    Ilan Komargodski
    Gil Segev
    [J]. Journal of Cryptology, 2020, 33 : 406 - 458
  • [4] From Minicrypt to Obfustopia via Private-Key Functional Encryption
    Komargodski, Ilan
    Segev, Gil
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 : 122 - 151
  • [5] From Minicrypt to Obfustopia via Private-Key Functional Encryption
    Komargodski, Ilan
    Segev, Gil
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (02) : 406 - 458
  • [6] ARRAY CODES FOR PRIVATE-KEY ENCRYPTION
    DESOUZA, RMC
    DESOUZA, JC
    [J]. ELECTRONICS LETTERS, 1994, 30 (17) : 1394 - 1396
  • [7] Reconfigurable instruction interface architecture for private-key cryptography on the Altera Nios-II processor.
    Moore, P
    McLoone, M
    Sezer, S
    [J]. TELECOMMUNICATIONS 2005, PROCEEDINGS, 2005, : 296 - 299
  • [8] Private-key cryptosystem for CD and DVD
    Jiawook, RN
    [J]. MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION, 1998, 3456 : 45 - 50
  • [9] Private-Key Hidden Vector Encryption with Key Confidentiality
    Blundo, Cailo
    Iovino, Vincenzo
    Persiano, Giuseppe
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 259 - 277
  • [10] Private-Key Fully Homomorphic Encryption for Private Classification
    Wood, Alexander
    Shpilrain, Vladimir
    Najarian, Kayvan
    Mostashari, Ali
    Kahrobaei, Delaram
    [J]. MATHEMATICAL SOFTWARE - ICMS 2018, 2018, 10931 : 475 - 481