Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.6.1279

Design and Implementation of High-Speed Software Cryptographic Modules Using GPU  

Song, JinGyo (Kookmin University)
An, SangWoo (Kookmin University)
Seo, Seog Chung (Kookmin University)
Abstract
To securely protect users' sensitive information and national secrets, the importance of cryptographic modules has been emphasized. Currently, many companies and national organizations are actively using cryptographic modules. In Korea, To ensure the security of these cryptographic modules, the cryptographic module has been verified through the Korea Certificate Module Validation Program(KCMVP). Most of the domestic cryptographic modules are CPU-based software (S/W). However, CPU-based cryptographic modules are difficult to use in servers that need to process large amounts of data. In this paper, we propose an S/W cryptographic module that provides a high-speed operation using GPU. We describe the configuration and operation of the S/W cryptographic module using GPU and present the changes in the cryptographic module security requirements by using GPU. In addition, we present the performance improvement compared to the existing CPU S/W cryptographic module. The results of this paper can be used for cryptographic modules that provide cryptography in servers that manage IoT (Internet of Things) or provide cloud computing.
Keywords
Cryptographic module; Software; CMVP; KCMVP; CPU; GPU;
Citations & Related Records
연도 인용수 순위
  • Reference
1 National Institute of Standard and Technology(NIST), "FIPS 140-3 Standards," 2019
2 Korea Standards Association, "KS X ISO/IEC 19790," Information technology-Security techniques-Security requirements for cryptographic modules, 2015
3 Korea Standards Association, "KS X ISO/IEC 24759," Information technology - Security techniques - Test requirements for cryptographic modules, 2015
4 Korea Internet & Security Agency (KISA), "https://seed.kisa.or.kr/kisa/kcmvp/Egosummary.do"
5 National Intelligence Service(NIS), "http://www.nis.go.kr/AF/1_7_3_1.do"
6 Nvidia, CUDA Toolkit, Nvidia Developer, "https://developer.nvicia.com/cuda-toolkit"
7 Nvidia, CUDA Toolkit Documentation, Nvidia Developer, "https://docs.nvidia.com/cuda/index.html"
8 Deuk-jo Hong, Jung-Keun Lee, Dong-Chan Kim, Dae-Sung Kwon, Kwon-Ho Ryu, and Dong-Geon Lee, "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," International Workshop on Information Security Applications (WISA), pp. 3-27, 2013
9 National Institute of Standard and Technology(NIST), "FIPS 180-4 Standards," 2015
10 National Institute of Standard and Technology(NIST), "FIPS 198-1 Standards," 2008
11 National Institute of Standard and Technology(NIST), "NIST SP 800-90A Determinstic Random Bit Generator Validation System", 2015
12 National Institute of Standard and Technology(NIST), "NIST SP 800-78-4 Cryptographic Algorithms and Key Sizes for Personal Identity Verification," 2015