期刊文献+

基于OpenCL的Salsa20算法实现与优化 被引量:1

Implementation and Optimization of Salsa20 Algorithm based on OpenCL
下载PDF
导出
摘要 目前,随着用户对隐私保护的需求日益增大,Salsa20加密算法广泛应用于物联网等设备。现有的Salsa20加密算法基本在CPU平台中实现,导致算法速度较慢,不适用于面向异构系统等并行处理器。因此,研究了一种基于OpenCL的Salsa20算法实现。该算法利用OpenCL高性能计算平台,广泛适用于多核心处理器和图形处理器,实现了面向异构系统的轻量级高安全性的流密码快速实现。实验结果表明,算法经过优化后的吞吐率达到11.5 Gb/s,是优化前的2倍。 At present,with the increasing needs of users for privacy protection,Salsa20 encryption algorithm is widely used in devices such as the Internet of Things.The existing Salsa20 encryption algorithm is basically implemented on the CPU platform,which causes the algorithm to be slow and not suitable for parallel processors such as heterogeneous systems.An implementation of Salsa20 algorithm based on OpenCL is explored.This algorithm uses the OpenCL high-performance computing platform,which is widely applicable to multi-core processors and graphics processors,and realizes the rapid implementation of lightweight and high-security stream ciphers for heterogeneous systems.Experimental results indicate that the optimized throughput rate of the algorithm reaches 11.5 Gb/s,which is twice the amount before optimization.
作者 尹浩 于飞 陈曼 YIN Hao;YU Fei;CHEN Man(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2020年第11期2790-2794,共5页 Communications Technology
关键词 OPENCL Salsa20 异构系统 算法优化 OpenCL Salsa20 heterogeneous system algorithm optimization
  • 相关文献

参考文献1

二级参考文献12

  • 1Deike P S, Biryukov A. Slid pairs in Salsa20 and trivium// INDOCRYPT 2008 : LNCS 5365. Kharagpur, 2008 : 1-14.
  • 2Julio C H C, Est~vez-Tapiador J M, Quisquater J J. On the Salsa20 core function // FSE 2008: LNCS 5086. Lausanne, 2008:462-469.
  • 3Aumasson J P, Fischer S, Shahram K, et al. New features of Latin dances: analysis of Salsa, ChaCha, and Rumba // FSE 2008: LNCS 5086. Lausanne, 2008, 470-488.
  • 4Crowley P. Truncated differential cryptanalysis of five rounds of Salsa20// SASC 2006. Leuven, 2006:198-202.
  • 5Fisher S, Willi M, Come B, et al. Non-randomness in eSTREAM candidates Salsa20 and TSC-4 // INDOCRYPT 2006 : LNCS 4329. Kolkaka, 2006 : 2-16.
  • 6Yukiyasu T, Terno S, Hiroyasu K, et al. Differential cryptanalysis of Salsa20/8 // SASC 2007. Bochum, 2007 : 39-50.
  • 7Biryukov A, Wagner D. Slide attacks // FSE1999: LNCS 1636. Rome, 1999:245-259.
  • 8Raphaed C W P. Advanced slide attacks revisited: realigning slide on DES // Cryptology-Mycrypt 2005: LNCS 3715. Kuala Lumpur, 2005:263-276.
  • 9Gorski M, Stefan L, Thomas P. Slide attacks on a class of hash functions // ASIACRYPT 2008: LNCS 5350. Melbourne, 2008 : 142-160.
  • 10Guido B, Daemen J, Peeters M, et al. On the indifferentiability of the sponge construction // EUROCRYPT 2008 : LNCS 4965. Istanbul, 2008 : 181- 197.

同被引文献22

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部