Accelerating private-key cryptography via multithreading on symmetric multiprocessors

被引:11
|
作者
Dongara, P
Vijaykumar, TN
机构
关键词
D O I
10.1109/ISPASS.2003.1190233
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today's computers. Despite steady improvements in microprocessor and system performance, private-key cipher implementations continue to be slow. Irrespective of the cipher used, the main reason for the low performance is lack of parallelism, which fundamentally comes from encryption modes such as the Cipher Block Chaining (CBC) mode. In CBC, each plaintext block is XOR'ed with the previous ciphertext block and then encrypted, essentially inducing a tight recurrence through the ciphertext blocks. To deliver high performance while maintaining high level of security assurance in real systems, the cryptography community has proposed Interleaved Cipher Block Chaining (ICBC) mode. In four-way interleaved chaining, the first, fifth, and every fourth block thereafter are encrypted in CBC mode; the second, sixth, and ever), fourth block thereafter are encrypted as another stream, and so on. Thus, interleaved chaining loosens the recurrence imposed by CBC, enabling the multiple encryption streams to be overlapped. The number of interleaved chains can be chosen to balance performance and adequate chaining to get good data diffusion. While ICBC was originally proposed to improve hardware encryption rates by employing multiple encryption chips in parallel, this is the first paper to evaluate ICBC via multithreading commonly-used ciphers on a symmetric multiprocessor (SMP). ICBC allows exploiting the full processing power of SMPs, which spend many cycles in cryptographic processing as medium-scale servers today, and will do so as chip-multiprocessor clients in the future. Using the Wisconsin Wind Tunnel II, we show that our multithreaded ciphers achieve encryption rates of 92 Mbytes/s on a 16-processor SMP at 1 GHz, reaching a factor of almost 10 improvement over a uniprocessor which achieves 9 Mbytes/s.
引用
收藏
页码:58 / 69
页数:12
相关论文
共 50 条
  • [41] PRIVATE-KEY ALGEBRAIC-CODE CRYPTOSYSTEMS WITH HIGH INFORMATION RATES
    HWANG, T
    RAO, TRN
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 657 - 661
  • [42] Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting
    Mefenza, Thierry
    Vergnaud, Damien
    [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1194 - 1213
  • [43] A cost-effective private-key cryptosystem for color image encryption
    Lukac, R
    Plataniotis, KN
    [J]. COMPUTATIONAL SCIENCE - ICCS 2005, PT 1, PROCEEDINGS, 2005, 3514 : 679 - 686
  • [44] The security of all private-key bits in isogeny-based schemes
    Shani, Barak
    [J]. DISCRETE APPLIED MATHEMATICS, 2020, 282 : 184 - 195
  • [45] Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
    Ilan Komargodski
    Gil Segev
    Eylon Yogev
    [J]. Journal of Cryptology, 2018, 31 : 60 - 100
  • [46] Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
    Komargodski, Ilan
    Segev, Gil
    Yogev, Eylon
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 352 - 377
  • [47] Reversible data hiding in encrypted images with private-key homomorphism and public-key homomorphism
    Chen, Bing
    Wu, Xiaotian
    Wei, Yun-Shan
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 57 : 272 - 282
  • [48] Public-key quantum digital signature scheme with one-time pad private-key
    Feng-Lin Chen
    Wan-Fang Liu
    Su-Gen Chen
    Zhi-Hua Wang
    [J]. Quantum Information Processing, 2018, 17
  • [49] A Password-based Key Establishment Protocol with Symmetric Key Cryptography
    Erguler, Imran
    Anarim, Emin
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 543 - 548
  • [50] Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
    Komargodski, Ilan
    Segev, Gil
    Yogev, Eylon
    [J]. JOURNAL OF CRYPTOLOGY, 2018, 31 (01) : 60 - 100