scispace - formally typeset
Journal ArticleDOI

An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration

Reads0
Chats0
TLDR
This paper presents a high-performance signature server called Guess that implements the elliptic curve digital signature algorithm (ECDSA) with 256-b key size on a Linux-powered commodity computer, harnessing a desktop graphics processing unit as a featured cryptographic accelerator.
Abstract
Over the Internet, digital signature has been an indispensable approach to securing e-commerce and other online transactions requiring authentication. Concerning the computing costs of signature generation and verification, it has become a more and more common practice for security practitioners to outsource such computations from heavily loaded application servers called tenants to dedicated proxies like signature servers in the enterprise private cloud. In this paper, we present our high-performance signature server called Guess . It implements the elliptic curve digital signature algorithm (ECDSA) with 256-b key size on a Linux-powered commodity computer, harnessing a desktop graphics processing unit as a featured cryptographic accelerator. We demonstrate our experience in maximizing the computing power of Guess and also its capability to deliver such power to the tenants, which includes down-to-earth customization and optimization considering various hardware and software factors. Our comprehensive implementation of ECDSA is tested against intensive network traffic. Field experiments show that Guess achieves $T_{s} = 8.71 \times 10^{6}$ operations per second (OPS) for signature generation or $T_{v} = 9.29 \times 10^{5}$ OPS for verification, which is significantly faster than existent prototypes and products. Guess is a universal server that readily supports various categories of elliptic curve cryptographic schemes, such as digital signature, key agreement, and encryption.

read more

Citations
More filters
Journal ArticleDOI

Blockchain based solutions to secure IoT: Background, integration trends and a way forward

TL;DR: A comprehensive survey on security improvements achieved in IoT systems using blockchain and the challenges that originate during this integration and the most relevant blockchain based IoT applications are presented.
Journal ArticleDOI

BitFund: A blockchain-based crowd funding platform for future smart and connected nation

TL;DR: A global crowdfunding platform called BitFund is proposed based on the need to an effective crowdfunding platform for developing smart nation and the inherent features of blockchain technology, which yields better results as compared to other generic algorithms for crowdfunding.
Proceedings ArticleDOI

Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications

TL;DR: The mathematical structure and operations of elliptic curves and how those properties make curves suitable tools for cryptography are explored, such as iris recognition, RFID, smart grid, as well as an application for E-health.
Journal ArticleDOI

A review on lightweight cryptography for Internet-of-Things based applications

TL;DR: From the study, it can be seen that the major security concern of these protocols is to perform with less computation and resist to attacks like man-in-the-middle, replay attacks, denial of service attacks, forgery and chosen-ciphertext attacks.
Proceedings ArticleDOI

A Blockchain-Based Peer-to-Peer Trading Scheme Coupling Energy and Carbon Markets

TL;DR: This paper implements pay-to-public-key-hash with multiple signatures as a transaction standard to realise a more secure transaction and reduced storage burden of senders and introduces a novel carbon accounting method and corresponding incentive mechanism for carbon reduction to evaluate emission behaviours of distributed prosumers.
References
More filters
Book

Guide to Elliptic Curve Cryptography

TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.

GPU Computing

TL;DR: The background, hardware, and programming model for GPU computing is described, the state of the art in tools and techniques are summarized, and four GPU computing successes in game physics and computational biophysics that deliver order-of-magnitude performance gains over optimized CPU applications are presented.
ReportDOI

Recommendation for Key Management, Part 1: General (Revision 3)

TL;DR: This Recommendation provides cryptographic key management guidance on policy and security planning requirements for U.S. government agencies and best practices for the management of cryptographic keying material.

Recommendation for Random Number Generation Using Deterministic Random Bit Generators

TL;DR: This Recommendation specifies mechanisms for the generation of random bits using deterministic methods based on either hash functions, block cipher algorithms or number theoretic problems.
Journal Article

Digital Signature Standard (DSS)

TL;DR: This Standard specifies a suite of algorithms that can be used to generate a digital signature to detect unauthorized modifications to data and to authenticate the identity of the signatory.
Related Papers (5)