CryptoGraphics: Cryptography using Graphics Processing Units Bachir Babale CSEPtu 590 3/8/2006.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts Jesús Arturo Pérez Díaz Darío Álvarez Gutiérrez Department of Informatics.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Secure Socket Layer.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
REAL-TIME VOLUME GRAPHICS Christof Rezk Salama Computer Graphics and Multimedia Group, University of Siegen, Germany Eurographics 2006 Real-Time Volume.
THINC: An Architecture for Thin-Client Computing Ricardo A. Baratto
The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Cryptography on Graphics Processors Francisco Chinchilla COMP 290-GPGP Presentation.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Principles of Information Security, 2nd edition1 Cryptography.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Control Flow Virtualization for General-Purpose Computation on Graphics Hardware Ghulam Lashari Ondrej Lhotak University of Waterloo.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
XWN740 X-Windows Configuring and Using X-Windows & Hardware (Chapter 1: Pages 11-19)‏
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 19,20, and 21: April 5, 10, and 12, 2007 Cryptographic Primitives.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
GPGPU overview. Graphics Processing Unit (GPU) GPU is the chip in computer video cards, PS3, Xbox, etc – Designed to realize the 3D graphics pipeline.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
OpenSSL acceleration using Graphics Processing Units
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Page 1 Transform SCN Sample, Compress, Network Transporting computer imagery over IP networks.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Programming Concepts in GPU Computing Dušan Gajić, University of Niš Programming Concepts in GPU Computing Dušan B. Gajić CIITLab, Dept. of Computer Science.
A Survey of Authentication Protocol Literature: Version 1.0 Written by John Clark and Jeremy Jacob Presented by Brian Sierawski.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
WEP Protocol Weaknesses and Vulnerabilities
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Lecture 2: Introduction to Cryptography
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Exploiting Instruction Streams To Prevent Intrusion Milena Milenkovic.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 11: Security.
GPGPU introduction. Why is GPU in the picture Seeking exa-scale computing platform Minimize power per operation. – Power is directly correlated to the.
3/12/2013Computer Engg, IIT(BHU)1 CUDA-3. GPGPU ● General Purpose computation using GPU in applications other than 3D graphics – GPU accelerates critical.
An Introduction to the Cg Shading Language Marco Leon Brandeis University Computer Science Department.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
General Purpose computing on Graphics Processing Units
Web Applications Security Cryptography 1
Security Outline Encryption Algorithms Authentication Protocols
Overview on Hardware Security
Visit for more Learning Resources
IEEE i Dohwan Kim.
Security through Encryption
ICS 454: Principles of Cryptography
csci5233 computer security & integrity (Chap. 4)
Chapter 29 Cryptography and Network Security
Presentation transcript:

CryptoGraphics: Cryptography using Graphics Processing Units Bachir Babale CSEPtu 590 3/8/2006

3/9/2006Bachir Babale2 Outline Motivations GPU Operations Stream Ciphers Block Ciphers (omitted) Building a Secure System PVP-UAB Conclusion

3/9/2006Bachir Babale3 Motivations New CPU performance model: parallelism GPUs are already highly parallel 24 fragment shading pipes 100s of hardware threads 150 Giga FLOPS (Nvidia’s G70)

3/9/2006Bachir Babale4 Motivations (2) Decrypting inside the GPU would allow secure visualization application

3/9/2006Bachir Babale5 GPU Operations 32 bit pixels processed as floating points RGB or RGBA formats in front/back buffer Operations used for cryptography: Copying pixels between coordinates Color maps Logical XOR Slowest operations in GPU No modular arithmetic for large integers

3/9/2006Bachir Babale6 Stream Ciphers Synchronous Binary Additive Stream Cipher Stream of pseudo- random digits XOR plaintext/ciphertext Algorithm for GPU Pre-compute keystream Load into GPU memory Load ciphertext into memory area with XOR enabled Benefits of parallel processing diminished if data is too small XOR rate of 105.0MB/s for a 600x600 area (75.5% of CPU)

3/9/2006Bachir Babale7 Block Ciphers (omitted) Bit level operations (shifts, rotates) not available No 32 bit data structure AES representation in GPU AES-GL rate is 50% of AES-C1, 2.4% of AES-C2 CPU usage for AES-GL is still 100%

3/9/2006Bachir Babale8 Building a secure system Server, Proxy, Client over an untrusted network GPU contains pre-installed certificate The data remains encrypted until in the GPU Dynamic session key -> Need for authentication Close to ideal 24fps for videoconferencing 500 updates/s for thin client application

3/9/2006Bachir Babale9 PVP-UAB Content Output Path Protected Video Path - User Accessible Bus Encrypts premium content on the bus to prevent hardware snoop hacks OS must verify valid subsystem Unique keys A challenge that leverages the complex arrangement of a large number of gates and a complex state model in the GPU 128 bit AES MPG2 and Windows Media 9 compression 2048 bit Diffie Hellman

3/9/2006Bachir Babale10 Conclusion GPUs can be used to offload the CPUs to apply stream ciphers on large segments GPU can serve as the base for a trusted computing visualization platform PVP-UAB brings authentication and compression Need to develop ciphers that can better exploit the capabilities of modern GPUs

3/9/2006Bachir Babale11 References CryptoGraphics: Secret Key Cryptography Using Graphics Cards Debra L. Cook., John Ioannidis., Angelos D. Keromytis., Jake Luck Remotely Keyed Cryptographics. Secure Remote Display Access Using. (Mostly) Untrusted Hardware Debra L. Cook., Ricardo Baratto., Angelos D. Keromytis Protected Interactive 3D Graphics Via Remote Rendering David Koller, Michael Turitzin, Marc Levoy), Marco Tarini, Giuseppe Croccia GPGPU IEEE Visualization 2005 TUTORIAL (03/05/2006) Output Content Protection and Windows Longhorn xhttp:// x (03/05/2006)