CryptoGraphics: Exploiting Graphics Cards For Security
CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing units (GPUs), and describes the relevance of GPU-based encryption and decryption to the security of applications involving remote displays. As a result of the increasing...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2006
|
Ausgabe: | 1st ed. 2006 |
Schriftenreihe: | Advances in Information Security
20 |
Schlagworte: | |
Online-Zugang: | UBR01 Volltext |
Zusammenfassung: | CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing units (GPUs), and describes the relevance of GPU-based encryption and decryption to the security of applications involving remote displays. As a result of the increasing processing power of GPUs, research involving the use of GPUs for general purpose computing has arisen. While GPUs do not support the range of operations found in CPUs, their processing power has grown to exceed that of CPUs and their designs are evolving to increase their programmability. GPUs are especially attractive for applications requiring a large quantity of parallel processing. This work extends such research by considering the use of GPUs as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. While certain operations make it impossible to implement some ciphers in a GPU, the operations used in most block ciphers, including AES, can be performed in GPUs. A detailed description and code for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. The motivation for using a GPU as a trusted component, including the applicability to thin-client and remote conferencing applications, is discussed. By enabling encryption and decryption in a GPU, unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system. A prototype implementation of GPU-based decryption for protecting displays exported to untrusted clients is described. Issues and solutions related to fully securing data on untrusted clients, including the protection of user input, are also discussed. CryptoGraphics: Exploiting Graphics Cards for Security is designed for a professional audience of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science |
Beschreibung: | 1 Online-Ressource (XVI, 140 Seiten 20 illus.) |
ISBN: | 9780387341897 |
DOI: | 10.1007/0-387-34189-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048842862 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230303s2006 |||| o||u| ||||||eng d | ||
020 | |a 9780387341897 |9 978-0-387-34189-7 | ||
024 | 7 | |a 10.1007/0-387-34189-7 |2 doi | |
035 | |a (ZDB-2-SWI)978-0-387-34189-7 | ||
035 | |a (OCoLC)1372482448 | ||
035 | |a (DE-599)BVBBV048842862 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-634 | ||
082 | 0 | |a 005.824 |2 23 | |
100 | 1 | |a Cook, Debra |e Verfasser |4 aut | |
245 | 1 | 0 | |a CryptoGraphics |b Exploiting Graphics Cards For Security |c by Debra Cook, Angelos D. Keromytis |
250 | |a 1st ed. 2006 | ||
264 | 1 | |a New York, NY |b Springer US |c 2006 | |
300 | |a 1 Online-Ressource (XVI, 140 Seiten 20 illus.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Information Security |v 20 | |
520 | |a CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing units (GPUs), and describes the relevance of GPU-based encryption and decryption to the security of applications involving remote displays. As a result of the increasing processing power of GPUs, research involving the use of GPUs for general purpose computing has arisen. While GPUs do not support the range of operations found in CPUs, their processing power has grown to exceed that of CPUs and their designs are evolving to increase their programmability. GPUs are especially attractive for applications requiring a large quantity of parallel processing. This work extends such research by considering the use of GPUs as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. | ||
520 | |a While certain operations make it impossible to implement some ciphers in a GPU, the operations used in most block ciphers, including AES, can be performed in GPUs. A detailed description and code for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. The motivation for using a GPU as a trusted component, including the applicability to thin-client and remote conferencing applications, is discussed. By enabling encryption and decryption in a GPU, unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system. A prototype implementation of GPU-based decryption for protecting displays exported to untrusted clients is described. Issues and solutions related to fully securing data on untrusted clients, including the protection of user input, are also discussed. | ||
520 | |a CryptoGraphics: Exploiting Graphics Cards for Security is designed for a professional audience of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science | ||
650 | 4 | |a Cryptology | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computer Engineering and Networks | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Data Science | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Information theory | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Computer engineering | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Artificial intelligence-Data processing | |
700 | 1 | |a Keromytis, Angelos D. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387290157 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387509693 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781441939647 |
856 | 4 | 0 | |u https://doi.org/10.1007/0-387-34189-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034108263 | ||
966 | e | |u https://doi.org/10.1007/0-387-34189-7 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184955294580736 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Cook, Debra Keromytis, Angelos D. |
author_facet | Cook, Debra Keromytis, Angelos D. |
author_role | aut aut |
author_sort | Cook, Debra |
author_variant | d c dc a d k ad adk |
building | Verbundindex |
bvnumber | BV048842862 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SWI)978-0-387-34189-7 (OCoLC)1372482448 (DE-599)BVBBV048842862 |
dewey-full | 005.824 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.824 |
dewey-search | 005.824 |
dewey-sort | 15.824 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/0-387-34189-7 |
edition | 1st ed. 2006 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04192nmm a2200601zcb4500</leader><controlfield tag="001">BV048842862</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230303s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387341897</subfield><subfield code="9">978-0-387-34189-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/0-387-34189-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SWI)978-0-387-34189-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1372482448</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048842862</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.824</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cook, Debra</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CryptoGraphics</subfield><subfield code="b">Exploiting Graphics Cards For Security</subfield><subfield code="c">by Debra Cook, Angelos D. Keromytis</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2006</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 140 Seiten 20 illus.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">20</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing units (GPUs), and describes the relevance of GPU-based encryption and decryption to the security of applications involving remote displays. As a result of the increasing processing power of GPUs, research involving the use of GPUs for general purpose computing has arisen. While GPUs do not support the range of operations found in CPUs, their processing power has grown to exceed that of CPUs and their designs are evolving to increase their programmability. GPUs are especially attractive for applications requiring a large quantity of parallel processing. This work extends such research by considering the use of GPUs as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">While certain operations make it impossible to implement some ciphers in a GPU, the operations used in most block ciphers, including AES, can be performed in GPUs. A detailed description and code for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. The motivation for using a GPU as a trusted component, including the applicability to thin-client and remote conferencing applications, is discussed. By enabling encryption and decryption in a GPU, unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system. A prototype implementation of GPU-based decryption for protecting displays exported to untrusted clients is described. Issues and solutions related to fully securing data on untrusted clients, including the protection of user input, are also discussed. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">CryptoGraphics: Exploiting Graphics Cards for Security is designed for a professional audience of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence-Data processing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Keromytis, Angelos D.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387290157</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387509693</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781441939647</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/0-387-34189-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034108263</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/0-387-34189-7</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048842862 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:38:20Z |
indexdate | 2024-07-10T09:47:33Z |
institution | BVB |
isbn | 9780387341897 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034108263 |
oclc_num | 1372482448 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-634 |
physical | 1 Online-Ressource (XVI, 140 Seiten 20 illus.) |
psigel | ZDB-2-SCS |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Springer US |
record_format | marc |
series2 | Advances in Information Security |
spelling | Cook, Debra Verfasser aut CryptoGraphics Exploiting Graphics Cards For Security by Debra Cook, Angelos D. Keromytis 1st ed. 2006 New York, NY Springer US 2006 1 Online-Ressource (XVI, 140 Seiten 20 illus.) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 20 CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing units (GPUs), and describes the relevance of GPU-based encryption and decryption to the security of applications involving remote displays. As a result of the increasing processing power of GPUs, research involving the use of GPUs for general purpose computing has arisen. While GPUs do not support the range of operations found in CPUs, their processing power has grown to exceed that of CPUs and their designs are evolving to increase their programmability. GPUs are especially attractive for applications requiring a large quantity of parallel processing. This work extends such research by considering the use of GPUs as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. While certain operations make it impossible to implement some ciphers in a GPU, the operations used in most block ciphers, including AES, can be performed in GPUs. A detailed description and code for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. The motivation for using a GPU as a trusted component, including the applicability to thin-client and remote conferencing applications, is discussed. By enabling encryption and decryption in a GPU, unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system. A prototype implementation of GPU-based decryption for protecting displays exported to untrusted clients is described. Issues and solutions related to fully securing data on untrusted clients, including the protection of user input, are also discussed. CryptoGraphics: Exploiting Graphics Cards for Security is designed for a professional audience of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science Cryptology Data Structures and Information Theory Computer Communication Networks Computer Engineering and Networks Coding and Information Theory Data Science Cryptography Data encryption (Computer science) Data structures (Computer science) Information theory Computer networks Computer engineering Coding theory Artificial intelligence-Data processing Keromytis, Angelos D. aut Erscheint auch als Druck-Ausgabe 9780387290157 Erscheint auch als Druck-Ausgabe 9780387509693 Erscheint auch als Druck-Ausgabe 9781441939647 https://doi.org/10.1007/0-387-34189-7 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cook, Debra Keromytis, Angelos D. CryptoGraphics Exploiting Graphics Cards For Security Cryptology Data Structures and Information Theory Computer Communication Networks Computer Engineering and Networks Coding and Information Theory Data Science Cryptography Data encryption (Computer science) Data structures (Computer science) Information theory Computer networks Computer engineering Coding theory Artificial intelligence-Data processing |
title | CryptoGraphics Exploiting Graphics Cards For Security |
title_auth | CryptoGraphics Exploiting Graphics Cards For Security |
title_exact_search | CryptoGraphics Exploiting Graphics Cards For Security |
title_exact_search_txtP | CryptoGraphics Exploiting Graphics Cards For Security |
title_full | CryptoGraphics Exploiting Graphics Cards For Security by Debra Cook, Angelos D. Keromytis |
title_fullStr | CryptoGraphics Exploiting Graphics Cards For Security by Debra Cook, Angelos D. Keromytis |
title_full_unstemmed | CryptoGraphics Exploiting Graphics Cards For Security by Debra Cook, Angelos D. Keromytis |
title_short | CryptoGraphics |
title_sort | cryptographics exploiting graphics cards for security |
title_sub | Exploiting Graphics Cards For Security |
topic | Cryptology Data Structures and Information Theory Computer Communication Networks Computer Engineering and Networks Coding and Information Theory Data Science Cryptography Data encryption (Computer science) Data structures (Computer science) Information theory Computer networks Computer engineering Coding theory Artificial intelligence-Data processing |
topic_facet | Cryptology Data Structures and Information Theory Computer Communication Networks Computer Engineering and Networks Coding and Information Theory Data Science Cryptography Data encryption (Computer science) Data structures (Computer science) Information theory Computer networks Computer engineering Coding theory Artificial intelligence-Data processing |
url | https://doi.org/10.1007/0-387-34189-7 |
work_keys_str_mv | AT cookdebra cryptographicsexploitinggraphicscardsforsecurity AT keromytisangelosd cryptographicsexploitinggraphicscardsforsecurity |