Details and description of Application
|
|
- Amelia Bryant
- 6 years ago
- Views:
Transcription
1 CUDA based implementation of parallelized Pollard's Rho algorithm for ECDLP M. Chinnici a, S. Cuomo b, M. Laporta c, B. Pennacchio d, A. Pizzirani e, S. Migliori f a,d ENEA- FIM-INFOPPQ, Casaccia Research Center, Via Anguillarese 301, S.Maria di Galeria, Italy b, c, d, e UNIVERSITA FEDERICO II, Dipartimento di Matematica e Applicazioni R.Caccioppoli Via Cinthia Napoli, Italy f ENEA-FIM, Enea-Sede, Lungotevere Thaon di Revel n. 76, Roma, Italy Introduction Setting Pollard s rho algorithm Recent introduction by NVidia of CUDA (Compute Unified Device Architecture) libraries for HPC (High Performance Computing) on GPUs (Graphic Processing Units) has started the trend to use video cards for resolution of many computationally hard problems in different areas like(among others): fluid dynamics, molecular dynamics, computer vision and astrophysics. Another area of interest where HPC is really useful is cryptoanalysis. In this paper we show how CUDA libraries (and hardware) can be used in cryptography as cryptoanalytic tool. Increase of data communications made data cryptography a real necessity. Sometimes private key cryptosystems are enough, more often public key cryptosystems are needed for communications on insecure channels. Cryptosystems based on elliptic curves offers both schemas with a relatively low communication overhead. In elliptic curves cryptography security is strongly based on presumed intractability of DLP (Discrete Logarithm Problem) in group of points of elliptic curve. So testing resistance of ECDLP (Elliptic Curves Discrete Logarithm Problem) means testing their security. In literature are known various methods (more or less efficient) to solve instances of DLP, some of them with deterministic running time, like Shank s Baby step-giant step, others with probabilistic running time but with a better trade off between space and time, like Pollard s Rho method. We describe an implementation of parallelized Pollard s Rho attack for ECDLP, realized using recent results for optimization of Pollard s Rho method and some choice ad-hoc for CUDA. Elliptic curves are geometric object having a dual nature of algebraic object. The set of their points together with a so called point to infinity can be viewed as a group structure. This means that points of this set, together with a well defined operation (usually called sum, and indicated with + ) have some interesting properties: operation is associative; existence of identity (the point to infinity); existence of inverses. operation is commutative. Elliptic curves maintain their structure of group regardless of the ground field so can be considered groups of points of elliptic curves defined over complex, reals, rationals and finite fields. The group of points of an elliptic curves defined over a finite fields has been proposed in the mid 1980s (independently) by Koblitz 1 and Miller 2 as base for a cryptosystem. Embedding a message (in some way) into a point of a curve and choosing an integer k as key we can compute a multiple kp of this point P, simply using repeated addition of P and computing 2P=P +P, 3P=P +P +P,, kp=p +P P. Multiple Q=kP of the point P is considered the encyphered message. Security of cryptosystem based on elliptic curves rely on the difficulty to invert this process: given Q, known to be a multiple of a point P, it s really hard to compute the value k so that Q=kP. This problem is called ECDLP. Best general purpose algorithm to solve instances of ECDLP is Pollard s rho algorithm. This algorithm proposed by Pollard use an iteration function f: P P to build a walk in the subgroup P (generated by point P) of the group of points of the elliptic curve. For ECDLP, starting point of this algorithm is a linear combination of P and Q (mp +nq), and function iterates until a point A=(aP +bq) belonging to the walk is generated a second time A=A =(a P +b Q) generating a collision. If a good collision is found then, by A=(aP +bq)=(a P +b Q) can be computed the value k used to compute Q=kP. Pollard 3 showed that if this walk is random enough, the algorithm has expected running time of (π P /2) 1/2. Further optimization to the algorithm have been submitted by Teske 4,5 modifying iterating function, by Van Oorschot 6 and Wiener 6 that showed that algorithm can be efficiently parallelized on R processor obtaining a speedup of R, and by Floyd 7 that showed that is not needed to store all points to check for collisions, but collision can be searched in a subset of points of the walk (distinguished points). Details and description of Application CUDA CUDA is a computing architecture developed by NVidia 8 to u- se graphic processing unit as a general purpose parallel processor. Programming of CUDA enabled hardware is realized mainly through C for CUDA, an extension of the C language that give user access to CUDA capabilities of the device. Even if C is the principal language to use CUDA hardware, third party wrappers are available for Python, Fortran, Java and MatLab. Actually, as reported by NVidia, there are millions of CUDAcapable gpus, and this diffusion is mainly due to price of this hardware varying from low prices for hardware with limited computing capabilities, to thousand of euros for dedicated hardware with 4 teraflops power (tesla series). Advantages offered by CUDA are: Scattered reads code can read to arbitrary addresses in memory. Shared memory CUDA exposes a fast shared memory region (16KB in size) that can be shared amongst threads. This can be used as a user-managed cache, enabling higher bandwidth than is possible using texture lookups. Faster downloads and readbacks to and from the GPU Full support for integer and bitwise operations, including integer texture lookups. Some limitations of CUDA enabled hardware are: No support for recursive functions on device. Division and inversion are computationally expansive operations. Threads using device memory should access memory to a- void coalescence, so data in device memory must be written ad-hoc. References 1. N. KOBLITZ. Elliptic curve cryptosystems. Mathematics of Computation, 48: , V. MILLER. Use of elliptic curves in cryptography. Advances in Cryptology CRYPTO 85 (LNCS 218) [483], , J. POLLARD. Monte Carlo methods for index computation (mod p). Mathematics of Computation, 32: , E. TESKE. Speeding up Pollard s rho method for computing discrete logarithms. Algorithmic Number Theory ANTS-III (LNCS 1423) [82], , E. TESKE. On random walks for Pollard s rho method. Mathematics of Computation,70: , P. VAN OORSCHOT AND M. WIENER. Parallel collision search with cryptanalytic applications. Journal of Application and first results Our implementation based on cuda of the parallelized version of Pollard s rho algorithm act in this way: 1. Host computes starting points and points needed for the iterarting funtion. 2. Starting points are copied from main memory to device memory, points of the iterating function and curve data are copied from main memory to constant memory of the video card. 3. Host starts 256 threads on gpu to compute new points. 4. Gpu computes new points using iterating function and check if new generated points are distinguished points. 5. If a new distinguished point is found it is reported to host. 6. Host stores distinguished points into a hash table and check for collision. Test made on a preliminary version of our application performing 4096 iterations with 256 threads (generating a total of points) shown a speed of more than points/ sec (test took seconds to complete). Cryptology,12:1 28, 1999.Cryptology,12:1 28, D.E. Knuth. The Art of Computer Programming, vol. II: Seminumerical Algorithms, Addison-Wesley, exercises 6 and 7, page 7. Knuth (p.4) credits Floyd for the algorithm called Tortoise and hare, without citation Fig. 2: An Example of walk in Pollard s rho algorithm, with a collision on a 2, giving the typical shape of the walk similar to greek letter rho. Problems Inefficient use of Division and inversion for modular arithmetic Fig. 1: An Example of elliptic curve on reals. Table showing problems encountered during application development Affine coordinates need computation of an inverse for sum and double of points. Points used to generate walks of the Pollard s rho algorithm need to be accessed by all threads. Different coordinates system for starting points (Jacobian) of the iterating function and points needed to generate iteration (Affine) Original Pollard s rho iterating function divide subgroup generated by P into 3 subsets and hasn t really good performances. Too many space required to store all points generated for curves on finite fields of large charateristic Solutions No division used for modular addition, difference and multiplication. Multiplication uses Montgomery algorithm. Used Jacobian coordinate system for starting points of the algorithm with a good trade-off between performances and occupation in memory. Points to generate the function a- re stored in constant memory in affine coordinates to reduce occupation. Use of mixed addition formula for Jacobian-Affine coordinates. Teske shown there s a performance increase splitting subgroup generated by P into a lager number of subsets. Use of affine coordinates for points of the iterating function allow us to use more than 64 subsets. Will be stored only distinguished points having 30bits of x coordinate all zero.
2
3
4
5 Fig.3 Benefits of multicluster queue.
6
7 ENEA-FIM, C.R. Portici
8
9 References sp12_graf3d/
10
CUDA based implementation of parallelized Pollard s Rho algorithm for ECDLP
FINAL WORKSHOP OF GRID PROJECTS, PON RICERCA 2000-2006, AVVISO 1575 1 CUDA based implementation of parallelized Pollard s Rho algorithm for ECDLP M. Chinnici 1, S. Cuomo 2, M. Laporta 2, A. Pizzirani 2,
More informationNumerical and Statistical tools for images analysis. based on the database from Frascati Tokamak Upgrade. Main System Skills
Numerical and Statistical tools for images analysis based on the database from Frascati Tokamak Upgrade M. Chinnici a, S. Cuomo b, S. Migliori c a ENEA- FIM-INFOPPQ, Casaccia Research Center, Via Anguillarese
More informationECDLP on GPU I. INTRODUCTION
ECDLP on GPU Lei Xu State Key Laboratory of Information Security Institute of Software,Chinese Academy of Sciences Beijing, China Email: xuleimath@gmail.com Dongdai Lin State Key Laboratory of Information
More informationPrime Field over Elliptic Curve Cryptography for Secured Message Transaction
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationFast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation
Fast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation Julio López 1 and Ricardo Dahab 2 1 Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L
More informationA SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS
A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 31 October 2017
Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 31 October 2017 Name : TU/e student number : Exercise 1 2 3 4 5 6 total points Notes: Please hand in this sheet at the end of the exam.
More informationBreaking ECC2K-130. May 20, Oberseminar Computer Security, COSEC group, B-IT, Bonn
Breaking ECC2K-130 Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez,
More informationUnderstanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography
Understanding Cryptography by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 9 Elliptic Curve Cryptography ver. February 2nd, 2015 These slides were prepared by Tim Güneysu, Christof Paar
More informationLecture IV : Cryptography, Fundamentals
Lecture IV : Cryptography, Fundamentals Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University Spring 2012 Basic Principles
More informationECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31
ECC Elliptic Curve Cryptography Foundations of Cryptography - ECC pp. 1 / 31 Elliptic Curve an elliptic curve E is a smooth, projective, algebraic curve defined by the following equation: y 2 3 2 a xy
More informationAbhijith Chandrashekar and Dushyant Maheshwary
By Abhijith Chandrashekar and Dushyant Maheshwary Introduction What are Elliptic Curves? Curve with standard form y 2 = x 3 + ax + b a, b ϵ R Characteristics of Elliptic Curve Forms an abelian group Symmetric
More informationA FAST AND EFFICIENT CRYPTOSYSTEM FOR RESOURCE CONSTRAINED NETWORKS
A FAST AND EFFICIENT CRYPTOSYSTEM FOR RESOURCE CONSTRAINED NETWORKS Nisheeth Saxena CSE Department - CET Mody University Lakshmangarh, Sikar, India nisheeth.somnath@gmail.com Anil Dahiya CSE Department
More informationAn effective Method for Attack RSA Strategy
Int. J. Advanced Networking and Applications 136 Volume: 03, Issue: 05, Pages: 136-1366 (01) An effective Method for Attack RSA Strategy Vibhor Mehrotra Assistant Professor Department of Computer Science,
More informationElliptic Curve Cryptography
Elliptic Curve Cryptography Cryptography is the science of securely transmitting information such that nobody but the intended recipient may understand its contents. Cryptography has existed in some form
More informationCollision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA
Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007) September 2007 Guerric Meurice de Dormale*, Philippe Bulens,
More informationThis chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest
1 2 3 This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest PKCS, Diffie- Hellman key exchange. This first published
More informationImplementation and Benchmarking of Elliptic Curve Cryptography Algorithms
Implementation and Benchmarking of Elliptic Curve Cryptography Algorithms Yulin Ou yulin_ou@umail.ucsb.edu Department of Electrical and Computer Engineering University of California Santa Barbara June
More information- 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT
- 0 - CryptoLib: Cryptography in Software John B. Lacy 1 Donald P. Mitchell 2 William M. Schell 3 AT&T Bell Laboratories ABSTRACT With the capacity of communications channels increasing at the current
More informationBreaking ECC2K-130 on Cell processors and GPUs
Breaking ECC2K-130 on Cell processors and GPUs Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer,
More informationKey Management and Distribution
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 10 Key Management; Other Public Key Cryptosystems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan
More informationIntroduction to Elliptic Curve Cryptography
A short and pleasant Introduction to Elliptic Curve Cryptography Written by Florian Rienhardt peanut.@.bitnuts.de Abstract This is a very basic and simplified introduction into elliptic curve cryptography.
More informationIsogeny graphs, algorithms and applications
Isogeny graphs, algorithms and applications University of Auckland, New Zealand Reporting on joint work with Christina Delfs (Oldenburg). Thanks: David Kohel, Drew Sutherland, Marco Streng. Plan Elliptic
More informationImproving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude Paul C. van Oorschot and Michael J. Wiener Bell-Northern Research, P.O. Box 3511 Station C, Ottawa, Ontario, K1Y 4H7, Canada {paulv,wiener}@bnr.ca
More informationHigh-Performance Modular Multiplication on the Cell Broadband Engine
High-Performance Modular Multiplication on the Cell Broadband Engine Joppe W. Bos Laboratory for Cryptologic Algorithms EPFL, Lausanne, Switzerland joppe.bos@epfl.ch 1 / 21 Outline Motivation and previous
More informationFactoring Semi-primes using Cluster Computing
Factoring Semi-primes using Cluster Computing Suraj Ketan Samal University of Nebraska-Lincoln December 15, 215 ssamal@cse.unl.edu 1. Abstract: Prime-factorization has long been a difficult problem to
More informationParallel programming in Matlab environment on CRESCO cluster, interactive and batch mode
Parallel programming in Matlab environment on CRESCO cluster, interactive and batch mode Authors: G. Guarnieri a, S. Migliori b, S. Podda c a ENEA-FIM, Portici Research Center, Via Vecchio Macello - Loc.
More informationElliptic Curve Cryptography on a Palm OS Device
Elliptic Curve Cryptography on a Palm OS Device André Weimerskirch 1, Christof Paar 2, and Sheueling Chang Shantz 3 1 CS Department, Worcester Polytechnic Institute, USA weika@wpi.edu 2 ECE and CS Department,
More informationElliptic Curve Public Key Cryptography
Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. The smaller key
More informationStudies on Modular Arithmetic Hardware Algorithms for Public-key Cryptography
Studies on Modular Arithmetic Hardware Algorithms for Public-key Cryptography Marcelo Emilio Kaihara Graduate School of Information Science Nagoya University January 2006 iii Dedicated to my father. Abstract
More informationParallel Scalar Multiplication of Elliptic Curve Points. CSE 633 George Gunner March 28, 2017 Professor: Dr. Russ Miller
Parallel Scalar Multiplication of Elliptic Curve Points CSE 633 George Gunner March 28, 2017 Professor: Dr. Russ Miller Motivation Elliptic curves are commonly used in public-key cryptography Digital Signatures
More informationSECURE METHOD FOR EMBEDDING PLAINTEXT ON AN ELLIPTIC CURVE USING TDMRC CODE AND KOBLITZ METHOD
SECURE METHOD FOR EMBEDDING PLAINTEXT ON AN ELLIPTIC CURVE USING TDMRC CODE AND KOBLITZ METHOD 1 CIMI THOMAS M, 2 DR. VARGHESE PAUL 1 Research Scholar, Department Of Computer Science, Karpagam University,
More informationJava Implementation And Arithmetic Performance Evaluation of Elliptic Curve Cryptography Using MATLAB
Java Implementation And Arithmetic Performance Evaluation of Elliptic Curve Cryptography Using MATLAB Amanpreet Kaur Vikas Goyal Pawan Luthra M.Tech scholar Assistant Professor CSE deptt. Assistant Professor
More informationSecuring Elliptic Curve Point Multiplication against Side-Channel Attacks
Main text appears in G. I. Davida, Y. Frankel (Eds.): Information Security ISC 2001, Springer-Verlag LNCS 2200, pp. 324 334, ISBN 3-540-42662-0. Addendum Efficiency Improvement added 2001-08-27/2001-08-29.
More informationA Simple User Authentication Scheme for Grid Computing
A Simple User Authentication Scheme for Grid Computing Rongxing Lu, Zhenfu Cao, Zhenchuai Chai, Xiaohui Liang Department of Computer Science and Engineering, Shanghai Jiao Tong University 800 Dongchuan
More informationA Review of Key Length SelectionFormula for Elliptic Curve Cryptosystems
Volume 3, No 4, July- August 2012 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at wwwijarcsinfo ISSN No 0976-5697 A Review of Key Length SelectionFormula
More informationChannel Coding and Cryptography Part II: Introduction to Cryptography
Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de
More informationCOUNTING THE POINTS OF AN ELLIPTIC CURVE ON A LOW-MEMORY DEVICE
COUNTING THE POINTS OF AN ELLIPTIC CURVE ON A LOW-MEMORY DEVICE Abstract. An important but very memory consuming step in elliptic curve cryptography is that of coming up with an elliptic curve where the
More informationDecrypting Network Traffic- Shared Access Control
Decrypting Network Traffic- Shared Access Control K.P.Vidya, Member, IAENG Abstract In this paper we propose a design to develop an engineering device for shared access to the decryption key of a public
More informationCryptography and Network Security Chapter 10. Fourth Edition by William Stallings
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture out of the
More informationSoftware Implementation of Tate Pairing over GF(2 m )
Software Implementation of Tate Pairing over GF(2 m ) G. Bertoni 1, L. Breveglieri 2, P. Fragneto 1, G. Pelosi 2 and L. Sportiello 1 ST Microelectronics 1, Politecnico di Milano 2 Via Olivetti, Agrate
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationElliptic Curve Cryptography (ECC) Elliptic Curve Cryptography. Elliptic Curves. Elliptic Curve Cryptography (ECC) Elliptic curve
Elliptic Curve Cryptography Gerardo Pelosi Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB) Politecnico di Milano gerardo.pelosi - at - polimi.it ECC was introduced by Victor Miller and
More informationThe Elliptic Curve Discrete Logarithm and Functional Graphs
Rose-Hulman Institute of Technology Rose-Hulman Scholar Mathematical Sciences Technical Reports (MSTR) Mathematics 7-9-0 The Elliptic Curve Discrete Logarithm and Functional Graphs Christopher J. Evans
More information36 Modular Arithmetic
36 Modular Arithmetic Tom Lewis Fall Term 2010 Tom Lewis () 36 Modular Arithmetic Fall Term 2010 1 / 10 Outline 1 The set Z n 2 Addition and multiplication 3 Modular additive inverse 4 Modular multiplicative
More informationBlockchain as cryptanalytic tool
Blockchain as cryptanalytic tool Extended Abstract Manfred Lochter Bundesamt für Sicherheit in der Informationstechnik (BSI), Germany Abstract One approach for blockchain based applications to provide
More informationIssues in Information Systems Volume 18, Issue 2, pp , 2017
IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY USING MICROSOFT EXCEL Abhijit Sen, Kwantlen Polytechnic University, abhijit.sen@kpu.ca ABSTRACT Microsoft Excel offers a number of data manipulation tools that
More informationElliptic Curve Cryptosystem
UDC 681.8 Elliptic Curve Cryptosystem VNaoya Torii VKazuhiro Yokoyama (Manuscript received June 6, 2000) This paper describes elliptic curve cryptosystems (ECCs), which are expected to become the next-generation
More informationAn improved proxy blind signature scheme based on ECDLP
Malaya J. Mat. 2(3)(2014) 228 235 An improved proxy blind signature scheme based on ECDLP Manoj Kumar Chande Shri Shankaracharya Institute Of Professional Management & Technology, Raipur, 492015, Chhattisgarh,
More informationElliptic Curve Cryptography (ECC) Elliptic Curve Cryptography. Elliptic Curves. Elliptic Curve Cryptography (ECC) Elliptic curve
Elliptic Curve Cryptography Gerardo Pelosi Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB) Politecnico di Milano gerardo.pelosi - at - polimi.it ECC was introduced by Victor Miller and
More informationNational University of Ireland, Maynooth MAYNOOTH, CO. KILDARE, IRELAND. Java Card Key Generation for Identity Based Systems
National University of Ireland, Maynooth MAYNOOTH, CO. KILDARE, IRELAND. DEPARTMENT OF COMPUTER SCIENCE, TECHNICAL REPORT SERIES Java Card Key Generation for Identity Based Systems Tom Dowling and Adam
More informationDiffie-Hellman Protocol as a Symmetric Cryptosystem
IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 33 Diffie-Hellman Protocol as a Symmetric Cryptosystem Karel Burda, Brno University of Technology, Brno, Czech
More informationNVIDIA GTX200: TeraFLOPS Visual Computing. August 26, 2008 John Tynefield
NVIDIA GTX200: TeraFLOPS Visual Computing August 26, 2008 John Tynefield 2 Outline Execution Model Architecture Demo 3 Execution Model 4 Software Architecture Applications DX10 OpenGL OpenCL CUDA C Host
More informationNEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1
International Journal of Technology (2017) 3: 519-527 ISSN 2086-9614 IJTech 2017 NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS Arash Eghdamian 1*, Azman Samsudin 1 1 School of Computer
More informationGeneral Purpose GPU Computing in Partial Wave Analysis
JLAB at 12 GeV - INT General Purpose GPU Computing in Partial Wave Analysis Hrayr Matevosyan - NTC, Indiana University November 18/2009 COmputationAL Challenges IN PWA Rapid Increase in Available Data
More informationImproving Divisor Arithmetic Over Genus 2 Hyperelliptic Curves
Improving Divisor Arithmetic Over Genus 2 Hyperelliptic Curves Sebastian Lindner Supervisor: Michael Jacobson Motivation Our goal is to make computation of divisor arithmetic in the divisor class group
More informationPublic Key Cryptography and RSA
Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange
More informationA Simple User Authentication Scheme for Grid Computing
International Journal of Network Security, Vol.7, No.2, PP.202 206, Sept. 2008 202 A Simple User Authentication Scheme for Grid Computing Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang (Corresponding
More informationBipartite Modular Multiplication
Bipartite Modular Multiplication Marcelo E. Kaihara and Naofumi Takagi Department of Information Engineering, Nagoya University, Nagoya, 464-8603, Japan {mkaihara, ntakagi}@takagi.nuie.nagoya-u.ac.jp Abstract.
More informationImproved Techniques for Fast Exponentiation
Improved Techniques for Fast Exponentiation Bodo Möller Technische Universität Darmstadt, Fachbereich Informatik moeller@cdc.informatik.tu-darmstadt.de Abstract. We present improvements to algorithms for
More informationIMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR 1Prof. Renuka H. Korti, 2Dr. Vijaya C.
ISSN 2320-9194 13 International Journal of Advance Research, IJOAR.org Volume 1, Issue 7, July 2013, Online: ISSN 2320-9194 IMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR
More informationA NOVEL RNS MONTGOMERY MATHEMATICAL PROCESS ALGORITHM FOR CRYPTOGRAPHY. Telangana, Medak, Telangana
A NOVEL RNS MONTGOMERY MATHEMATICAL PROCESS ALGORITHM FOR CRYPTOGRAPHY SANA MEHWAR 1 P.RENUKA 2 sanamehwar@gmail.com 1 renoostar@gmail.com 2 1 PG Scholar, Dept of ECE, Indur Institute of Engineering and
More informationNotes for Lecture 10
COS 533: Advanced Cryptography Lecture 10 (October 16, 2017) Lecturer: Mark Zhandry Princeton University Scribe: Dylan Altschuler Notes for Lecture 10 1 Motivation for Elliptic Curves Diffie-Hellman For
More information--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GM/T Translated English of Chinese Standard: GM/T0044.
Translated English of Chinese Standard: GM/T0044.1-2016 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA GM
More informationThe Application of Elliptic Curves Cryptography in Embedded Systems
The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography
More informationStudying Software Implementations of Elliptic Curve Cryptography
Studying Software Implementations of Elliptic Curve Cryptography Hai Yan and Zhijie Jerry Shi Department of Computer Science and Engineering, University of Connecticut Abstract Elliptic Curve Cryptography
More informationHardware for Collision Search on Elliptic Curve over GF(2 m )
Hardware for Collision Search on Elliptic Curve over GF(2 m ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be UCL Crypto Group
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would
More informationA New Attack with Side Channel Leakage during Exponent Recoding Computations
A New Attack with Side Channel Leakage during Exponent Recoding Computations Yasuyuki Sakai 1 and Kouichi Sakurai 2 1 Mitsubishi Electric Corporation, 5-1-1 Ofuna, Kamakura, Kanagawa 247-8501, Japan ysakai@iss.isl.melco.co.jp
More informationRSA. Public Key CryptoSystem
RSA Public Key CryptoSystem DIFFIE AND HELLMAN (76) NEW DIRECTIONS IN CRYPTOGRAPHY Split the Bob s secret key K to two parts: K E, to be used for encrypting messages to Bob. K D, to be used for decrypting
More informationPublic Key Cryptography. Toni Bluher Women and Mathematics Program Lecture 2 May 22, 2018
Public Key Cryptography Toni Bluher Women and Mathematics Program Lecture 2 May 22, 2018 Disclaimer: The opinions expressed are those of the writer and not necessarily those of NSA/CSS, the Department
More informationPublic Key Encryption
Public Key Encryption A case study THE RSA CRYPTOSYSTEM Public 31/05/14 Key Encryption 2 Rivest Shamir Adleman (1978) Key generation 1. Generate two large, distinct primes p, q (100 200 decimal digits)
More informationProvably Secure and Efficient Cryptography
Provably Secure and Efficient Cryptography Tsuyoshi TAKAGI TU Darmstadt ttakagi@cdc.informatik.tu-darmstadt.de http://www.informatik.tu-darmstadt.de/ti/ Contents Overview NICE Cryptosystem Provable Security
More informationNumber Theory and Cryptography
Volume 114 No. 11 2017, 211-220 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Number Theory and Cryptography 1 S. Vasundhara 1 G.Narayanamma Institute
More informationThe Beta Cryptosystem
Bulletin of Electrical Engineering and Informatics Vol. 4, No. 2, June 2015, pp. 155~159 ISSN: 2089-3191 155 The Beta Cryptosystem Chandrashekhar Meshram Department of Mathematics, RTM Nagpur University,
More informationOptimization solutions for the segmented sum algorithmic function
Optimization solutions for the segmented sum algorithmic function ALEXANDRU PÎRJAN Department of Informatics, Statistics and Mathematics Romanian-American University 1B, Expozitiei Blvd., district 1, code
More informationCryptography and Network Security
Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY
More informationCS 179: GPU Computing. Lecture 16: Simulations and Randomness
CS 179: GPU Computing Lecture 16: Simulations and Randomness Simulations South Bay Simulations, http://www.panix.com/~brosen/graphics/iacc.400.jpg Exa Corporation, http://www.exa.com/images/f16.png Flysurfer
More informationPRDSA: Effective Parallel Digital Signature Algorithm for GPUs
I.J. Wireless and Microwave Technologies, 2017, 5, 14-21 Published Online September 2017 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2017.05.02 Available online at http://www.mecs-press.net/ijwmt
More informationCS Network Security. Nasir Memon Polytechnic University Module 7 Public Key Cryptography. RSA.
CS 393 - Network Security Nasir Memon Polytechnic University Module 7 Public Key Cryptography. RSA. Course Logistics Homework 2 revised. Due next Tuesday midnight. 2/26,28/02 Module 7 - Pubic Key Crypto
More informationA New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms
2614 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 10, OCTOBER 2014 A New Double Point Multiplication Algorithm Its Application to Binary Elliptic Curves with Endomorphisms Reza Azarderakhsh Koray Karabina
More informationKey Management and Elliptic Curves
Key Management and Elliptic Curves Key Management Distribution of ublic Keys ublic-key Distribution of Secret Keys Diffie-Hellman Key Echange Elliptic Curves Mathematical foundations Elliptic curves over
More informationSPA resistant left-to-right integer recodings
SPA resistant left-to-right integer recodings Nicolas Thériault Department of Combinatorics and Optimization, University of Waterloo Abstract. We present two left-to-right integer recodings which can be
More informationPost-Quantum Cryptography A Collective Challenge
Post-Quantum Cryptography A Collective Challenge Christophe Petit University of Oxford Mathematical Institute Christophe Petit -Oxford Crypto Day 1 Cryptography is very useful Cryptography is the science
More informationAn Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India
More informationZERO KNOWLEDGE UNDENIABLE SIGNATURE SCHEME OVER SEMIGROUP ACTION PROBLEM
ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS N. 38 2017 (45 53) 45 ZERO KNOWLEDGE UNDENIABLE SIGNATURE SCHEME OVER SEMIGROUP ACTION PROBLEM Neha Goel Department of Mathematics University of Delhi Delhi
More informationEnhanced ECC algorithm over Public Key Cryptography
Enhanced ECC algorithm over Public Key Cryptography 1 2 Miss PrastavanaP P, Mrs. Suraiya PraveenP 1. Student of Jamia Hamdard University, Delhi 2. Assistant Professor in Computer Science Department Abstract
More informationIntroduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption
Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that
More informationElliptic Curves as Tool for Public Key Cryptography
Research Inventy: International Journal Of Engineering And Science Vol.5, Issue 6 (June 2015), PP 06-12 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Elliptic Curves as Tool for Public
More informationUsing Commutative Encryption to Share a Secret
Using Commutative Encryption to Share a Secret Saied Hosseini Khayat August 18, 2008 Abstract It is shown how to use commutative encryption to share a secret. Suppose Alice wants to share a secret with
More informationA Combined Encryption Compression Scheme Using Chaotic Maps
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression
More informationA Residue Approach of the Finite Field Arithmetics
A Residue Approach of the Finite Field Arithmetics 1/20 A Residue Approach of the Finite Field Arithmetics JC Bajard LIRMM, CNRS UM2 161 rue Ada, 34392 Montpellier cedex 5, France A Residue Approach of
More informationRandomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks Elisabeth Oswald and Manfred Aigner Institute for Applied Information Processing and Communications Graz University of Technology,
More informationKonstantinos Chalkias, George Filiadis, and George Stephanides
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal s Algorithm Konstantinos Chalkias, George Filiadis,
More informationParallel Direct Simulation Monte Carlo Computation Using CUDA on GPUs
Parallel Direct Simulation Monte Carlo Computation Using CUDA on GPUs C.-C. Su a, C.-W. Hsieh b, M. R. Smith b, M. C. Jermy c and J.-S. Wu a a Department of Mechanical Engineering, National Chiao Tung
More informationElliptic Curve Cryptography and its Application in the Secure Socket Layer/Transport Layer Security Protocol
Elliptic Curve Cryptography and its Application in the Secure Socket Layer/Transport Layer Security Protocol M. Cimi Thomas 1* and S. Sheeja 2 1* Research Scholar, Department of Computer Science, Karpagam
More informationO Majid Khabbazian, 2004
Software Elliptic Curve Cryptography Majid Khabbazian B.Sc., Sharif University of Technology, 2002 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Masters of Applied Science
More informationOpenACC Course. Office Hour #2 Q&A
OpenACC Course Office Hour #2 Q&A Q1: How many threads does each GPU core have? A: GPU cores execute arithmetic instructions. Each core can execute one single precision floating point instruction per cycle
More informationPublic Key Cryptography
graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,
More informationOptimized Scientific Computing:
Optimized Scientific Computing: Coding Efficiently for Real Computing Architectures Noah Kurinsky SASS Talk, November 11 2015 Introduction Components of a CPU Architecture Design Choices Why Is This Relevant
More information