Skip to main content

TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12938))

Abstract

Driven by computer vision and autopilot industries, embedded graphics processing units (GPUs) are now rapidly achieving extraordinary computing power, such NVIDIA Tegra K1/X1/X2, which are widely used in embedded environments such as mobile phones, game console and vehicle-mounted systems. Such performance advantages give embedded GPUs the possibility of accelerating cryptography that also requires high-density computing. In this paper, we implement TX-RSA in embedded GPU platforms, i.e., NVIDIA TX2, to accelerate the most prevailing public-key cryptosystem, RSA. Various optimization methods are employed to promote the efficiency, including multi-threaded Montgomery multiplication and CRT implementation on the resource-constricted embedded GPUs. Within 20 W of power consumption, TX-RSA can deliver 6,423 ops/s of RSA encryption and 131,324 ops/s of RSA decryption, which outperforms implementations in the desktop GPUs and embedded CPUs in the perspective of performance-to-power ratio.

This work was partially supported by National Natural Science Foundation of China under Award No. 61902392 and Guangxi Key Laboratory of Cryptography and Information Security (No. CIS202120).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. China Briefing: (2021). https://www.china-briefing.com/news/chinas-double-11-shopping-festival-tests-consumption-strength-after-covid-19/

  2. Cheng, W., Zheng, F., Pan, W., Lin, J., Li, H., Li, B.: Building your private cloud storage on public cloud service using embedded GPUs. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds.) SecureComm 2018. LNICST, vol. 254, pp. 512–528. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01701-9_28

    Chapter  Google Scholar 

  3. U.S. Department of Commerce/National Institute of Standards and Technology: Digital Signature Standard (DSS) (2013). http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf

  4. Dong, J., Zheng, F., Emmart, N., Lin, J., Weems, C.: sDPF-RSA: utilizing floating-point computing power of GPUs for massive digital signature computations. In: 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp. 599–609. IEEE (2018)

    Google Scholar 

  5. Dong, J., Zheng, F., Pan, W., Lin, J., Jing, J., Zhao, Y.: Utilizing the double-precision floating-point computing power of GPUs for RSA acceleration. Secur. Commun. Netw. 2017 (2017)

    Google Scholar 

  6. Emmart, N., Zheng, F., Weems, C.: Faster modular exponentiation using double precision floating point arithmetic on the GPU. In: 2018 IEEE 25th Symposium on Computer Arithmetic (ARITH), pp. 130–137. IEEE (2018)

    Google Scholar 

  7. OpenSSL Software Foundation: OpenSSL Cryptography and SSL/TLS Toolkit (2016). http://www.openssl.org/

  8. Knuth, D.E.: The Art of Computer Programming: Seminumerical Algorithms, vol. 2, p. 116. Addison-Wesley, Boston (1981)

    Google Scholar 

  9. Koç, C.K.: Analysis of sliding window techniques for exponentiation. Comput. Math. Appl. 30(10), 17–24 (1995)

    Article  MathSciNet  Google Scholar 

  10. Koç, C.K.: High-speed RSA implementation. Technical report, RSA Laboratories (1994)

    Google Scholar 

  11. Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519–521 (1985)

    Article  MathSciNet  Google Scholar 

  12. Neves, S., Araujo, F.: On the performance of GPU public-key cryptography. In: 2011 IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP), pp. 133–140. IEEE (2011)

    Google Scholar 

  13. NVIDIA: CUDA C programming guide 9.0 (2017). https://docs.nvidia.com/cuda/cuda-c-programming-guide/

  14. Quisquater, J.J., Couvreur, C.: Fast decipherment algorithm for RSA public-key cryptosystem. Electron. Lett. 18(21), 905–907 (1982)

    Article  Google Scholar 

  15. Rescorla, E.: The transport layer security (TLS) protocol version 1.3. RFC 8446, pp. 1–160 (2018). https://doi.org/10.17487/RFC8446

  16. Yang, Y., Guan, Z., Sun, H., Chen, Z.: Accelerating RSA with fine-grained parallelism using GPU. In: Lopez, J., Wu, Y. (eds.) ISPEC 2015. LNCS, vol. 9065, pp. 454–468. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-17533-1_31

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangyu Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dong, J., Fan, G., Zheng, F., Lin, J., Xiao, F. (2021). TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12938. Springer, Cham. https://doi.org/10.1007/978-3-030-86130-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86130-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86129-2

  • Online ISBN: 978-3-030-86130-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics