parallelized rsa algorithm an analysis with performance
play

Parallelized RSA Algorithm: An Analysis With Performance Evaluation - PowerPoint PPT Presentation

Parallelized RSA Algorithm: An Analysis With Performance Evaluation using OpenMP Library in High Performance Computing Environment Md. Ahsan Ayub , Zishan Ahmed Onik, Steven Smith Department of Computer Science Tennessee Technological


  1. Parallelized RSA Algorithm: An Analysis With Performance Evaluation using OpenMP Library in High Performance Computing Environment Md. Ahsan Ayub , Zishan Ahmed Onik, Steven Smith Department of Computer Science Tennessee Technological University {mayub42, zonik42, smsmith23}@students.tntech.edu De December 19, , 2019

  2. Content • Introduction • Methodology • Results • Conclusion ht https://w ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 2 2019 22n 2019 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  3. Introduction (1/4) Methodology Results Conclusion Basic Encryption C = “EFG” M = “ABC” M = “ABC” C= E_K(M) M = D_K(C) Key = shift -4 Key = shift +4 https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 3 2019 22n 2019 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  4. Introduction (2/4) Methodology Results Conclusion Symmetric Encryption • The encryption / decryption keys are the same (K) • An example of symmetric key encryption based communication – • Alice and Bob agree on a cryptosystem (e.g. AES) • Alice and Bob agree on a (secret) key K • Alice encrypts a message using K and she sends it to Bob C = E_K(M) • Bob decrypts the message using K, M = D_K(C) • Faster implementation https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 4 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  5. Introduction (3/4) Methodology Results Conclusion Asymmetric Encryption • There are two different keys (K1, K2) • It is not possible (or computationally feasible) to calculate K1 given K2 or vice versa • Encryption with one key, decryption with the other key • An example – • Alice and Bob agree on a public-key crypto system (e.g., RSA) • Bob’s public key PKb is sent to Alice • Alice encrypts a message with Bob’s public key and sends it • Bob decrypts the message using his private key SKb • Slower implementation https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 5 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  6. Introduction (4/4) Methodology Results Conclusion Goals: Asymmetric Encryption • The process of encrypting and decrypting a message will be computationally feasible. • Deriving the private key from the public key of a particular user should be computationally infeasible. • Deriving the private key from a chosen plaintext should also be computationally infeasible. ht https://w ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 6 2019 22n 2019 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  7. Methodology ht https://w ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  8. Introduction Methodology (1/3) Results Conclusion RSA Algorithm https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 8 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  9. Introduction Methodology (2/3) Results Conclusion A Use Case of RSA Algorithm https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 9 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  10. Introduction Methodology (3/3) Results Conclusion Our Major Contribution • Due to the benefits of the RSA algorithm, the necessity of faster implementations will continue to grow. • In our study, we parallelize the exponentiation operations of the RSA algorithm in a high performance computing environment. https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 10 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  11. Results ht https://w ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  12. Introduction Methodology Results (1/3) Conclusion Experimental Parameters https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 12 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  13. Introduction Methodology Results (2/3) Conclusion Experimental Findings https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 13 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  14. Introduction Methodology Results (3/3) Conclusion Experimental Findings (Cont.) https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 14 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  15. Conclusion ht https://w ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  16. Introduction Methodology Results Conclusion (1/3) Summary • Different avenues of the RSA parallelization techniques discussed in our paper (a survey of 1978 till date) • Parallelize exponentiation operation of the RSA algorithm using OpenMP library in HPC environment • RSA is not a classic parallelizable problem, e.g., Matrix Multiplication • In the spirit of open science, our developed tool has made open source and available online at – https://github.com/AhsanAyub/RSAParallelization ht https://w ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 16 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  17. Introduction Methodology Results Conclusion (2/3) Future Work • Incorporating the Chinese Remainder Theorem (CRT) to optimize modular operations • Utilizing another high performance message passing computing library, such as, Message Passing Interface (MPI), and then provide a comparison • Focusing on GPU-based implementation ht https://w ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 17 2019 22n 2019 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  18. Introduction Methodology Results Conclusion (3/3) Acknowledgement • Anonymous reviewers • Dr. Ambareen Siraj and Dr. Sheikh Ghafoor • Professor, Dept. of Computer Science, Tennessee Tech University • Cybersecurity Education, Research and Outreach Center (CEROC) at Tennessee Tech University ht https://w ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 18 2019 22n 2019 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

  19. THANK YOU! Happy to take any questions you may have! https://w ht ://www.tnt ntech. h.edu/c u/ceroc | @TechC hCEROC | ceroc@tnt ntech. h.edu 2019 2019 22n 22nd Internat atio ional al Confe ference of f Compu puter an and Info format atio ion Technolo logy (ICCIT)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend