Evaluating Accelerators for a High-Throughput Hash-Based Security Protocol

Kaitlyn Lee, Brian Donnelly, Tomer Sery, Dan Ilan, Bertrand Cambou, Michael Gowanlock

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security threats are rising due to widely available computational power and near-future quantum computers. New cryptographic protocols have been developed to address these challenges, but very few protocols take advantage of parallel computing. In this paper, we propose optimizations to the cryptography protocol Response-Based Cryptography (RBC). Since the protocol is general-purpose, it can be incorporated into post-quantum cryptography systems to authenticate users in resource-constrained environments, like Internet of Thing (IoT) devices. The optimizations proposed in this paper allow for clients to be authenticated faster. Additionally, this paper makes a cross-platform comparison of the performance of the optimized RBC protocol on the Graphics Processing Unit (GPU), the Central Processing Unit (CPU), and the Associative Processing Unit (APU). We find that the GPU and APU yield similar performance but the APU can be much more energy efficient. Furthermore, we evaluate the multi-GPU scalability of the algorithm and achieve a minimum speedup of 2.66 × on 3 × A100 GPUs.

Original languageEnglish (US)
Title of host publication52nd International Conference on Parallel Processing, ICPP 2023 - Workshops Proceedings
PublisherAssociation for Computing Machinery
Pages40-49
Number of pages10
ISBN (Electronic)9798400708435
DOIs
StatePublished - Aug 7 2023
Event52nd International Conference on Parallel Processing, ICPP 2023 - Workshops Proceedings - Salt Lake City, United States
Duration: Aug 7 2023Aug 10 2023

Publication series

NameACM International Conference Proceeding Series

Conference

Conference52nd International Conference on Parallel Processing, ICPP 2023 - Workshops Proceedings
Country/TerritoryUnited States
CitySalt Lake City
Period8/7/238/10/23

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Fingerprint

Dive into the research topics of 'Evaluating Accelerators for a High-Throughput Hash-Based Security Protocol'. Together they form a unique fingerprint.

Cite this