Channels ▼
RSS

Parallel

Encrypting the Internet


Conclusion

In summary, we're researching new technologies that offer cryptographic algorithm acceleration by factors. Our ultimate goal is to make general-purpose processors capable of processing and forwarding encrypted traffic at very high speeds so that the Internet can be gradually transformed into a completely secure information delivery infrastructure. We also believe that these technologies can benefit other usage models, such as disk encryption and storage.

References

[1] R.L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.

[2] V. Rijmen. "Efficient Implementation of the Rijndael S-box.

[3] Advanced Encryption Standard. Federal Information Processing Standards Publication 197.

[4] P. Montgomery. Multiplication without trial division.

[5] P. Barrett. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor.

[6] S. Gueron, O. Parzanchevsky and O. Zuk. Masked Inversion in GF(2n) Using Mixed Field Representations and its Efficient Implementation for AES.

[7] S. Gueron. Advanced Encryption Standard (AES) Instructions Set."

[8] S. Gueron and M. Kounavis. Carry-Less Multiplication and Its Usage for Computing the GCM Mode.

[9] A. Karatsuba and Y. Ofman. Multiplication of Multidigit Numbers on Automata.

[10] M. E. Kounavis. A New Method for Fast Integer Multiplication and its Application to Cryptography.

[11] S. Grover and M. Kounavis. "On the Impact of Simultaneous Multithreading on the Performance of Cryptographic Workloads." Technical Report, available from the authors upon request.

This article and more on similar subjects may be found in the Intel Technology Journal, June 2009 Edition, "Advances in Internet Security".


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.
 

Video