Font Size: a A A

Design And Implementation Of Secure Hash Algorithm Based On The GPU

Posted on:2013-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y CuiFull Text:PDF
GTID:2248330371984019Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The development of today must rely on information and communication, the linksbetween people are more than ever too frequent, people had overcome geographical barriers,distance is no longer a constraint factors of human’s smooth communication, network securityissues began to stand out in the communication process. People gradually began to useencryption technology to ensure the security of the information in the communication process,and encryption technology which is an important application in the digital signature. Digitalsignature using public key cryptography to sign the information as a confirmation to ensurethe legitimacy and authenticity of the sender of the message, the recipient can confirm thesource of information. Secure Hash Algorithm is an important tool for digital signatures,which makes the digital signature can be executed correctly, the acceleration of the SecureHash Algorithm also improve the efficiency of the implementation of digital signature, so ifwe can find an accelerated Secure Hash Algorithm way, it will make a great contribution toe-commerce, e-government.The hash algorithm is to accept a period of clear text, and then convert it to a section ofciphertext, the conversion is an irreversible manner, the ciphertext is called the messagedigest, this conversion is a one-way irreversible. The hash algorithm SHA-1, already have avery strong resistance to cryptanalysis attacks. SHA-1has more anti-attack power than theoriginal MD5hash algorithm,about232magnitude, so that the improvement of the SHA-1hasa very important practical significance. Knowledge of the SHA-1, including the processes ofthe algorithm, the core compression function and the basic concepts and principles, do someimprovements to the algorithm, these improvements include the algorithm serial conversionof input, the logic function of the algorithm, the algorithm for parallel, gives the main ideaand process of each improvement are described in detail.In recent years, the graphics processor’s floating-point operations and bandwidth areuncovered, the GPU (Graphics Processing Unit) no longer applies only to the graphicsprocessing, these characteristics are very suitable for large-scale intensive data processing,the use of GPU parallel computing is a predictable very promising direction of development.Another recent years important parallel system is clustered, this article first cluster-basedparallel computing and GPU-based parallel computing for a brief introduction, indicating thatthe GPU the advantages relative to the cluster, and then for Secure Hash Algorithm SHA-1‘snature, the GPU-based parallelization is more efficient than the cluster-based. And SHA-1 algorithm for GPU-based parallel taking into account the confidentiality and integrity,respectively, to take on the GPU, adding grouping, transformation logic functions, digitalsignature and a series of measures, although the improved algorithm is much more than theoriginal complex structure become more advantages than the original algorithm, but thepracticality of the algorithm, and makes many improvements The algorithm can be applied tomore effective information security, escort for message communication.In this paper, the purpose is to improve the speed of SHA-1, I mainly want to use the GPU‘s potential of resources to improve the SHA-1encryption speed, to borrow the GPU’s parallelcapabilities,make the serial SHA-1’s implementation in parallel, a new direction has openedup for SHA-1’s development.
Keywords/Search Tags:Graphics Processor, CUDA, SHA-1, Parallel Encryption Algorithm
PDF Full Text Request
Related items