期刊文献+

GPU加速希尔加解密方法的研究 被引量:3

Research of Hill encryption and decryption algorithms with GPU
下载PDF
导出
摘要 GPU有效地利用了数量巨大的晶体管制造大量的处理单元,适用于处理单任务多数据(SIMD)的计算任务。研究了GPU的体系结构及CUDA的编程模式,改进了基于CPU的希尔加解密方法,使用多个线程将计算中耗时的矩阵相乘部分改造成SIMD模式,并分析了线程块内线程数对加速比的影响。实验结果表明,基于GPU的并行矩阵相乘的希尔加解密方法成功实现了硬件加速,相对于CPU上运行的希尔加解密方法,其执行效率明显提高,可获取12倍以上的加速,并易于扩展,对大规模数据加密和解密处理呈现出高效的处理能力。 Graphic Processing Uni(tGPU) uses a huge number of transistors to create a large number of processing units,applying to the handling of Single-Instruction Multiple-Data(SIMD) computing tasks.In this paper,the architecture of GPU and the programming model of CUDA are first studied,and then the traditional algorithm of Hill encryption and decryption based on CPU are redesigned into SIMD mode,so that time-consuming part of matrix multiplication during the whole process can be imple-mented by parallel threads.Finally,the effect of the number of threads per thread block on speed-up is analyzed.The result shows that the method of parallel matrix multiplication based on GPU is with high efficiency compared with the tradition Hill encryption and decryption algorithms implemented on CPU,can get the acceleration of more than 12 times,and shows great potential in data encryption and decryption.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第18期49-51,共3页 Computer Engineering and Applications
基金 教育部高校行动计划智能科学与技术No.2004XD-03~~
关键词 统一计算设备架构 图形处理单元 希尔加密 希尔解密 Compute Unified Device Architecture(CUDA) Graphic Processing Uni(tGPU) Hill encryption Hill decryption
  • 相关文献

参考文献3

二级参考文献19

  • 1梁亮,张定华,毛海鹏,顾娟.一种基于可编程图形硬件的快速三维图像重建算法[J].计算机应用研究,2006,23(1):241-243. 被引量:5
  • 2戴智晟,陈志强,邢宇翔,张丽,毕文元.用通用显卡加速三维锥束T-FDK重建算法[J].清华大学学报(自然科学版),2006,46(9):1589-1592. 被引量:6
  • 3Rueda A J,Ortega LGeometric algorithms on CUDA.GRAPP 2008:59-60. 被引量:1
  • 4Stone J E,Phillips J C,Freddolino P L,et al.Accelerating molecular modeling applications with graphics processors[J].Journal of Computational Chemistry,2007,28 (16):2618-2640. 被引量:1
  • 5Manavski S A,Valle G.CUDA compatible GPU cards as efficient hardware accelerators for Smith-Waterman sequence alignment[J].BMC Bioinformatics,2008,9 (2). 被引量:1
  • 6Belleman R G,Bédorf J,Portegies Zwart S F.High performance direct gravitational n-body simulations on graphics processing Units Ⅱ:An implementation in CUDA[J].New Astronomy,2008,13(2):103-112. 被引量:1
  • 7Durand C X,Faguy D.Rational zoom of bit maps using B-spine interpolation[C]//CoSMuterized 2-D animation CoSMuter graphics Forum,1990,9:27-37. 被引量:1
  • 8Nvidia Corporation.CUDA Programming Guide 0.8[Z].2006-11-21:36-37. 被引量:1
  • 9Hou H S,Harry C.Cubic spline for image interpolation and digital filtering[J].IEEE Transactions on Acoustics,speech,and Signal Processing,1978,ASS M-26 (6):508-517. 被引量:1
  • 10Splines U M.A perfect fit for signal and image processing[J].IEEE Signal Processing Magazine,1999,16(6):22-38. 被引量:1

共引文献15

同被引文献30

  • 1Kedem G, Ishihara Y.Brute force attack on UNIX passwords with SIMD computer[C]//Proceedings of the 8th USENIX Security Symposium, 1999. 被引量:1
  • 2Hermans J.Speed records for NTRU[C]//LNCS 5985: Proceedings of the CT-RSA 2010,2010:73-88. 被引量:1
  • 3Zerwinski R, Guneysu T.Exploiting the power of GPUs for asymmetric cryptography[C]//Proceedings of the 10th International Workshop on CHES 2008,2008,5154:79-99. 被引量:1
  • 4Harrison O, Waldron J;Effcient acceleration of asymmetric cryptography on graphics hardware[C]//Proceedings /ntemational Conference on Cryptology in Africa,Gammarth,2009,5580.350-367. 被引量:1
  • 5Hoffstein J, Pipher J,Silverman J H.NTRU: a new high speed public key cryptosystem[C]//Proc of Algorithm Number Theory (ANTS III).[S.l.] : Springer-Verlag, 1998,1423:267-288. 被引量:1
  • 6ChaUa N,Pradhan J.GridNtru: high performance PKCS[C]//Proceedings 26th World Academy of Science, Engineering and Technology,Dec 2007,2007: 540-543. 被引量:1
  • 7Buchmann J, Doting M, Lindner R.Efficiency improvement for NTRU[C]//Proceedings of the SICHERHEIT 2008,2008: 79-94. 被引量:1
  • 8Bailey D, coffin D, Elbrit A, et ai.NTRU in constrained devices[C]// Proceedings Workshop on Cryptographic Hardware and Embedded Systems-CHES 2001.[S.l.]: Springer-Verlag, 2001 : 266-277. 被引量:1
  • 9Whyte W,Howgrave-Graham N,Hoffstein J,et al.IEEE P1363.1 Draft 10 Draft Standard for Public Key Crypto-graphic Techniques Based on Hard Problems over Lattices[S]. 被引量:1
  • 10Stone J E,Phillips J C,Freddolino P L,et al.Accelerat- ing molecular modeling applications with graphics pro- cessors[J].Journal of Computational Chemistry,2007,28 (16) :2618-2640. 被引量:1

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部