Affiliation:
1. School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing JiangSu, China
2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
3. School of Cyber Security, University of Science and Technology of China, Hefei, China
4. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China
Abstract
Driven by artificial intelligence and computer vision industries, Graphics Processing Units (GPUs) are now rapidly achieving extraordinary computing power. In particular, the NVIDIA Tegra K1/X1/X2 embedded GPU platforms, which are also treated as edge computing devices, are now widely used in embedded environments such as mobile phones, game consoles, and vehicle-mounted systems to support high-dimension display, auto-pilot, and so on. Meanwhile, with the rise of the Internet of Things (IoT), the demand for cryptographic operations for secure communications and authentications between edge computing nodes and IoT devices is also expanding. In this contribution, instead of the conventional implementations based on FPGA, ASIC, and ARM CPUs, we provide an alternative solution for cryptographic implementation on embedded GPU devices. Targeting the new cipher suite added in TLS 1.3, we implement Edwards25519/448 and Curve25519/448 on an edge computing platform, embedded GPU NVIDIA Tegra X2, where various performance optimizations are customized for the target platform, including a novel parallel method for the register-limited embedded GPUs. With about 15 W of power consumption, it can provide 210k/31k ops/s of Curve25519/448 scalar multiplication, 834k/123k ops/s of fixed-point Edwards25519/448 scalar multiplication, and 150k/22k ops/s of unknown-point one, which are respectively the primitives and main workloads of key agreement, signature generation, and verification of the TLS 1.3 protocol. Our implementations achieve 8 to 26 times speedup of OpenSSL running in the very powerful ARM CPU of the same platform and outperform the state-of-the-art implementations in FPGA by a wide margin with better power efficiency.
Funder
National Key Research and Development Program of China
CCF-Tencent Open Fund
National Natural Science Foundation of China
Open Project of National Engineering Laboratory for Mobile Internet System and Application Security
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference54 articles.
1. Inc. Amazon Web Services. [n.d.]. AWS CloudHSM User Guide . Retrieved 17 Nov. 2021 from https://docs.aws.amazon.com/cloudhsm/latest/userguide/index.html.
2. Reza Azarderakhsh Matthew Campagna Craig Costello L. D. Feo Basil Hess Amir Jalali David Jao Brian Koziel Brian LaMacchia Patrick Longa et al. 2017. Supersingular isogeny key encapsulation (unpublished).
3. US Department of Commerce and National Institute of Standards & Technology. 2012. Secure Hash Standard (SHS). National Institute of Standards & Technology Gaithersburg MD.
4. Curve25519: New Diffie-Hellman Speed Records
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献