skip to main content
10.1145/3143344.3143356acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbebConference Proceedingsconference-collections
research-article

CUDA Implementation of DES Algorithm for Lightweight Platforms

Authors Info & Claims
Published:14 September 2017Publication History

ABSTRACT

Our daily life, with the knowledge revolution has entered into a major transformation. For the last few years, with the concept of "internet of things", experts agree that this transformation will affect every part of society and the concept of business. However, this rapid transformation has many problems. One of the most important problems is how to secure the information on digital media? There are many cryptographic solutions to ensure information security. However, since the devices we use in our daily lives have various resource constraints, more efficient algorithms are needed for both memory and processing requirements. In this study, one of the most widely used block encryption algorithms-DES algorithm is implemented on CUDA to investigate what kind of improvements could be made as performance. The analysis and test results show that a more efficient design is obtained than the original DES algorithm.

References

  1. Katz, J. and Lindell Y. 2007. Introduction to Modern Cryptography. CRC Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Barik, A. S., Mishra, S. and Pradhan, M. 2015. Cryptography on Graphics Processing Unit: A Survey. International Journal of Latest Trends in Engineering and Technology (IJLTET), 5, 1, (Jan. 2015), 155--163.Google ScholarGoogle Scholar
  3. Avoine, G. and Kara, O. 2013. Lightweight Cryptography for Security and Privacy. Second International Workshop, LightSec (Gebze, Turkey, May 06 - 07, 2013) Revised Selected Papers.Google ScholarGoogle ScholarCross RefCross Ref
  4. Eisenbarth, T. and Öztürk, E. 2014. Lightweight Cryptography for Security and Privacy. Third International Workshop, LightSec (Istanbul, Turkey, September 01 - 02, 2014) Revised Selected Papers.Google ScholarGoogle Scholar
  5. Paar, C. and Pelzl, J. 2010. Understanding Cryptography: A Textbook for Students and Practitioners. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Stallings, W. 2014. Cryptography and Network Security: Principles and Practice. 6th Edition, Pearson. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cook, S. 2012. Cuda Programming: A Developer's Guide to Paralel Computing with GPUs. Elsevier, Morgan Kaufmann. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Londhe, D., Barapatre P., Gholap, N., and Das, S. 2013. A Survey on GPU System Considering its Performance On Different Applications. Computer Science & Engineering: An International Journal (CSEIJ), 3, 4, (August 2013), 11--19.Google ScholarGoogle Scholar
  9. Sanders, J. and Kandrot, E. 2011. CUDA By Example: An Introduction to General-Purpose GPU Programming. Addison-Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cheng, J., Grossman, M. and McKercher, T. 2014. Professional CUDA C Programming, Wiley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nickolls, J. and Dally, W. J. 2010. The GPU Computing Era. IEEE Micro, 30, 2, (Mar. 2010), 56--69. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. CUDA Implementation of DES Algorithm for Lightweight Platforms

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICBEB 2017: Proceedings of the 2017 International Conference on Biomedical Engineering and Bioinformatics
        September 2017
        76 pages
        ISBN:9781450352970
        DOI:10.1145/3143344

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 September 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader