INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.7, No.5, Sep. 2017

PRDSA: Effective Parallel Digital Signature Algorithm for GPUs

Full Text (PDF, 380KB), PP.14-21


Views:56   Downloads:0

Author(s)

Sapna Saxena, Neha Kishore

Index Terms

Digital Signature;RSA Algorithm;Graphical processing Unit;CUDA Programming;Parallel Computing

Abstract

RSA based Digital Signature algorithm is an electronic scheme to ensure the security, authenticity and integrity of an electronic document intended to be used on Internet. Due to the involvement of RSA in signing and signature verification which is based on the series of modular multiplications and modular reductions on very large integers, the RSA based digital signature algorithm become compute-intensive and takes lot of time and energy to execute. A potential solution to this problem is to use the massive parallel powers of the multiprocessors of GPU that can simplify its complex computational part via CUDA programming. This paper presents a faster GPU based pRDSA algorithm which serves the same purpose as the RSA Digital Signature Algorithm but with less computational complexity. Proposed algorithm is an energy efficient parallel version of Digital Signature Algorithm to achieve high performance in the area of network security. It is based on SIMD model of parallel programming and implements repeated square-and-multiply method to compute the digital signature. The conceptual model of pRDSA and its performance have been discussed in this paper.

Cite This Paper

Sapna Saxena, Neha Kishore," PRDSA: Effective Parallel Digital Signature Algorithm for GPUs ", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.7, No.5, pp. 14-21, 2017.DOI: 10.5815/ijwmt.2017.05.02

Reference

[1]Diffie, W. & Hellman, M. Nov 1976. New directions in cryptography. Information Theory, IEEE Transactions on, 22(6), 644–654. 

[2]D. Poulakis. A variant of Digital Signature Algorithm. Designs, Codes and Cryptography, 51(1):99-104, 2009.

[3]Menezes, A. J., Vanstone, S. A., & Oorschot, P. C. V. 1996. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA. 

[4]Bewick, G. 1994. Fast multiplication algorithms and implementation. 

[5]Fu, C. & Zhu, Z.-L. Oct. 2008. An efficient implementation of RSA digital signature algorithm. In Wireless Communications, Networking and Mobile Computing, 2008. WiCOM 08. 4th International Conference on, 1–4. 

[6]Saxena S and Kapoor B. Parallel RSA-Based Digital Signature Algorithm For Digital Signing Applications. International Journal of Applied Engineering Research. 10(3): 7757-7764, 2015.

[7]Goldwasser, Shafi, Silvio Micali, and Ronald L. Rivest. "A digital signature scheme secure against adaptive chosen-message attacks." SIAM Journal on Computing 17.2 (1988): 281-308.

[8]Merkle, Ralph. "A certified digital signature." Advances in Cryptology—CRYPTO’89 Proceedings. Springer Berlin/Heidelberg, 1990.

[9]Li, Changxin, et al. "Efficient implementation for MD5-RC4 encryption using GPU with CUDA." Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on. IEEE, 2009.

[10]Szerwinski, Robert, and Tim Güneysu. "Exploiting the power of GPUs for asymmetric cryptography." Cryptographic Hardware and Embedded Systems–CHES 2008 (2008): 79-99.

[11]Szerwinski, Robert, and Tim Güneysu. "Exploiting the power of GPUs for asymmetric cryptography." Cryptographic Hardware and Embedded Systems–CHES 2008 (2008): 79-99.

[12]Dai, Wei, et al. "NTRU modular lattice signature scheme on CUDA GPUs." High Performance Computing & Simulation (HPCS), 2016 International Conference on. IEEE, 2016.

[13]Lin, Caiwei, Lei Zhao, and Jiwen Yang. "A cuda based implementation of an image authentication algorithm." Information Engineering and Computer Science (ICIECS), 2010 2nd International Conference on. IEEE, 2010.

[14]Saxena, Sapna, and Bhanu Kapoor. "An efficient parallel algorithm for secured data communications using RSA public key cryptography method." Advance Computing Conference (IACC), 2014 IEEE International. IEEE, 2014.

[15]Saxena, Sapna, et al. "Comparative Analysis of Sequential and Parallel Implementations of RSA." International Journal of Scientific and Engineering Research 4.8 (2013): 2100-2103.

[16]Kishore  N. and Kapoor B. An efficient parallel algorithm for hash computation in security and forensics applications. Advance Computing Conference (IACC), 2014 IEEE International. IEEE, 2014.

[17]Kishore, Neha. "Parllel hashing algorithms for security and Forensic Applicatons." (2015).