{"id":4591,"date":"2011-07-05T09:52:22","date_gmt":"2011-07-05T09:52:22","guid":{"rendered":"http:\/\/hgpu.org\/?p=4591"},"modified":"2011-07-05T09:52:22","modified_gmt":"2011-07-05T09:52:22","slug":"implementing-aes-on-gpu-final-report","status":"publish","type":"post","link":"https:\/\/hgpu.org\/?p=4591","title":{"rendered":"Implementing AES on GPU: Final Report"},"content":{"rendered":"<p>Encryption and decryption are increasingly important. In order to protect the security of individuals, corporations and even governments, information needs to be secured against potential threats. The basis of encryption&#8217;s security is its robustness under a brute force attack as the key space of AES-128 is 3.4&#215;10^38 keys in size. Even at a sustained rate of 1 Tkeys\/second, it would take 1019 years to exhaust the key space. Since AES on large blocks is computationally intensive and largely byte-parallel. Certain modes of AES are more easily parallelizable and these are ideal candidates for parallelization on GPUs. Also, using GPU resources as co-processors allows better utilization of the central processing unit. Implementing the AES algorithm on the NVidia GPU has provided a 14.5x speedup over a similar implementation on the CPU.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption and decryption are increasingly important. In order to protect the security of individuals, corporations and even governments, information needs to be secured against potential threats. The basis of encryption&#8217;s security is its robustness under a brute force attack as the key space of AES-128 is 3.4&#215;10^38 keys in size. Even at a sustained rate [&hellip;]<\/p>\n","protected":false},"author":351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11,3,287],"tags":[370,368,1782,20,1800],"class_list":["post-4591","post","type-post","status-publish","format-standard","hentry","category-computer-science","category-paper","category-security","tag-aes","tag-block-ciphers","tag-computer-science","tag-nvidia","tag-security"],"views":2550,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/4591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4591"}],"version-history":[{"count":0,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/4591\/revisions"}],"wp:attachment":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}