GPU Acceleration of RSA is Vulnerable to Side-channel Timing Attacks
The RSA algorithm [21] is a public-key cipher widely used in digital signatures and Internet protocols, including the Security Socket Layer (SSL) and Transport Layer Security (TLS). RSA entails excessive computational complexity compared with symmetric ciphers. For scenarios where an Internet domain...
Saved in:
| Published in: | 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) pp. 1 - 8 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
ACM
01.11.2018
|
| Subjects: | |
| ISSN: | 1558-2434 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The RSA algorithm [21] is a public-key cipher widely used in digital signatures and Internet protocols, including the Security Socket Layer (SSL) and Transport Layer Security (TLS). RSA entails excessive computational complexity compared with symmetric ciphers. For scenarios where an Internet domain is handling a large number of SSL connections and generating digital signatures for a large number of files, the amount of RSA computation becomes a major performance bottleneck. With the advent of general-purpose GPUs, the performance of RSA has been improved significantly by exploiting parallel computing on a GPU [9], [18], [23], [26], leveraging the Single Instruction Multiple Thread (SIMT) model. |
|---|---|
| AbstractList | The RSA algorithm [21] is a public-key cipher widely used in digital signatures and Internet protocols, including the Security Socket Layer (SSL) and Transport Layer Security (TLS). RSA entails excessive computational complexity compared with symmetric ciphers. For scenarios where an Internet domain is handling a large number of SSL connections and generating digital signatures for a large number of files, the amount of RSA computation becomes a major performance bottleneck. With the advent of general-purpose GPUs, the performance of RSA has been improved significantly by exploiting parallel computing on a GPU [9], [18], [23], [26], leveraging the Single Instruction Multiple Thread (SIMT) model. |
| Author | Fei, Yunsi Kaeli, David Luo, Chao |
| Author_xml | – sequence: 1 givenname: Chao surname: Luo fullname: Luo, Chao organization: Northeastern University, Boston, MA, USA – sequence: 2 givenname: Yunsi surname: Fei fullname: Fei, Yunsi organization: Northeastern University, Boston, MA, USA – sequence: 3 givenname: David surname: Kaeli fullname: Kaeli, David organization: Northeastern University, Boston, MA, USA |
| BookMark | eNotzLFOwzAUhWGDQKItnRlY_AIpvr527YxRoQWpEoi2rJVrX4MhdVASBt6eIJg-6T_SGbOz3GRi7ArEDEDpG5RKmLme_WpBnrDxUAXqUgtzykagtS2kQnXBpl33LoSQ1sAwj9jt6mnHK--pptb1qcm8ifx5U_HU8ZevOg_1UBPvG75JgQr_5nKmmm_TMeVXXvW98x_dJTuPru5o-u-E7ZZ328V9sX5cPSyqdeGkMn0RJJboYlBKuEDKelvquQuAETFEVUL0MqJWVmkf8YAlaHOwIAajD9bghF3__SYi2n-26eja773V1hgQ-ANOq0pm |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1145/3240765.3240812 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 1450359507 9781450359504 |
| EISSN | 1558-2434 |
| EndPage | 8 |
| ExternalDocumentID | 8587710 |
| Genre | orig-research |
| GroupedDBID | 123 6IE 6IF 6IH 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO FEDTE IEGSK IJVOP M43 OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-a247t-d2393afd440ade48c8956ad13f33df491fc2f354845cf3b39157b810915fcd873 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 2 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000494640800111&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:56:50 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a247t-d2393afd440ade48c8956ad13f33df491fc2f354845cf3b39157b810915fcd873 |
| PageCount | 8 |
| ParticipantIDs | ieee_primary_8587710 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-Nov. |
| PublicationDateYYYYMMDD | 2018-11-01 |
| PublicationDate_xml | – month: 11 year: 2018 text: 2018-Nov. |
| PublicationDecade | 2010 |
| PublicationTitle | 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) |
| PublicationTitleAbbrev | ICCAD |
| PublicationYear | 2018 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssj0002871359 ssj0020286 |
| Score | 2.109898 |
| Snippet | The RSA algorithm [21] is a public-key cipher widely used in digital signatures and Internet protocols, including the Security Socket Layer (SSL) and Transport... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Ciphers Computational modeling Graphics processing units Kernel Message systems Microsoft Windows Timing |
| Title | GPU Acceleration of RSA is Vulnerable to Side-channel Timing Attacks |
| URI | https://ieeexplore.ieee.org/document/8587710 |
| WOSCitedRecordID | wos000494640800111&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZKxQALjxbxlgdG0jaxE1_GCihMVUVb1K1y7DOqVCWoTfj95JKodGBhsnWSJetuuIf9fR9jD6gBjA1jL5E0ukGNHsjY90Jt40FgrIyFq8Qm1HgMi0U8abHHHRYGEavPZ9ijbfWWbzNT0KisDyEoRXiqA6VUjdXazVOo8heUmptmqzREDZWPL8M-8c6pKOzRCiQ_uaelUqWS0cn_LnHKur-YPD7ZZZsz1sL0nB3v0Ql22PPrZM6HxpSZpI4rzxx_nw75ass_ijXxSydr5HnGpyuLHmF-U1zzGQl7ffJhnhPevsvmo5fZ05vXqCR4OpAq9yyRmGlnpRxoixIMlC2Ptr5wQlhX-t2ZwImyMZGhcSIhQniVAPGBhs5YUOKCtdMsxUvGrUaIhAh0YlCiciAByxPaj4yKbaSuWIf8sfyqiTCWjSuu_zbfsKOyuoAauHfL2vmmwDt2aL7z1XZzX0XvB3mKmTg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG4ImqgXH2B824NHF9htu-0eiYoYkRABw41026khIbsGFn-_O7sEOXjx1GaSJs3MYR7t932E3IFWylgReTHH0Q1o8BSPfE9oG7UCY3nEXCE2Ift9NZlEgwq532BhAKD4fAYN3BZv-TY1KxyVNZVQUiKeakdwHvglWmszUcHan2FyXrdbuSFck_n4XDSReU6GooGrQgHKLTWVIpl0Dv93jSNS_0Xl0cEm3xyTCiQn5GCLULBGHp8HY9o2Js8lZWRp6uj7sE1nS_qxmiPDdDwHmqV0OLPgIeo3gTkdobTXJ21nGSLu62TceRo9dL21ToKnAy4zzyKNmXaW85a2wJVRedOjrc8cY9blnncmcCxvTbgwjsVICS9jhYygwhmrJDsl1SRN4IxQq0GFjAU6NsBBOsUV5Ce0HxoZ2VCekxr6Y_pVUmFM1664-Nt8S_a6o7fetPfSf70k-3mtoUoY3xWpZosVXJNd853NloubIpI_pWacfw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2018+IEEE%2FACM+International+Conference+on+Computer-Aided+Design+%28ICCAD%29&rft.atitle=GPU+Acceleration+of+RSA+is+Vulnerable+to+Side-channel+Timing+Attacks&rft.au=Luo%2C+Chao&rft.au=Fei%2C+Yunsi&rft.au=Kaeli%2C+David&rft.date=2018-11-01&rft.pub=ACM&rft.eissn=1558-2434&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1145%2F3240765.3240812&rft.externalDocID=8587710 |