High Throughput Implementation of Post-Quantum Key Encapsulation and Decapsulation on GPU for Internet of Things Applications
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Wai-Kong | - |
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.accessioned | 2023-01-19T01:42:19Z | - |
dc.date.available | 2023-01-19T01:42:19Z | - |
dc.date.created | 2023-01-18 | - |
dc.date.issued | 2022-11 | - |
dc.identifier.issn | 1939-1374 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/86723 | - |
dc.description.abstract | Internet of Things (IoT) sensor nodes are placed ubiquitously to collect information, which is then vulnerable to malicious attacks. For instance, adversaries can perform side channel attack on the sensor nodes to recover the symmetric key for encrypting IoT data. Refreshing the symmetric key frequently can reduce the risk of compromised keys. However, the number of sensor nodes connected to the gateway and cloud server is massive. Refreshed symmetric keys need to be sent to gateway devices and cloud server frequently with a secure key encapsulation mechanism (KEM), which is time-consuming. In this article, novel and efficient implementation techniques are proposed to accelerate Kyber, a post-quantum KEM, on a Graphics Processing Unit (GPU). Fully parallel implementation of number theoretic transform (NTT) with combined levels is presented, which is 2.65x faster than state-of-the-art result on a GPU. Other proposed techniques include parallel rejection sampling, central binomial distribution with coalesced memory access and parallel fine-grain AES-256. These techniques enable high throughput performance with 162760 encapsulations/second and 107631 decapsulations/second on an RTX2060 GPU. This is also the first fine grain implementation of post-quantum KEM (Kyber) on a GPU, which can be used to offer key encapsulation/decapsulation as a service to reduce the burden on IoT systems. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON SERVICES COMPUTING | - |
dc.title | High Throughput Implementation of Post-Quantum Key Encapsulation and Decapsulation on GPU for Internet of Things Applications | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000899285900013 | - |
dc.identifier.doi | 10.1109/TSC.2021.3103956 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON SERVICES COMPUTING, v.15, no.6, pp.3275 - 3288 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85145252607 | - |
dc.citation.endPage | 3288 | - |
dc.citation.startPage | 3275 | - |
dc.citation.title | IEEE TRANSACTIONS ON SERVICES COMPUTING | - |
dc.citation.volume | 15 | - |
dc.citation.number | 6 | - |
dc.contributor.affiliatedAuthor | Lee, Wai-Kong | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Post-quantum cryptography | - |
dc.subject.keywordAuthor | key encapsulation mechanism | - |
dc.subject.keywordAuthor | graphics processing units | - |
dc.subject.keywordAuthor | Kyber | - |
dc.subject.keywordAuthor | lattice-based cryptography | - |
dc.subject.keywordPlus | EFFICIENT | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.