CryptoGraphics: Exploiting Graphics Cards For Security: Advances in Information Security, cartea 20
Autor Debra Cook, Angelos D. Keromytisen Limba Engleză Hardback – 2 iun 2006
CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs for general purpose computing has arisen. This work extends such research by considering the use of a GPU as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. A detailed description for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 620.85 lei 6-8 săpt. | |
Springer Us – 29 noi 2010 | 620.85 lei 6-8 săpt. | |
Hardback (1) | 626.65 lei 6-8 săpt. | |
Springer Us – 2 iun 2006 | 626.65 lei 6-8 săpt. |
Din seria Advances in Information Security
- 20% Preț: 997.94 lei
- 20% Preț: 634.18 lei
- 20% Preț: 901.80 lei
- 20% Preț: 1142.04 lei
- 20% Preț: 866.25 lei
- 20% Preț: 935.17 lei
- 20% Preț: 625.78 lei
- 15% Preț: 624.39 lei
- 20% Preț: 634.68 lei
- 20% Preț: 1128.79 lei
- 18% Preț: 984.44 lei
- 20% Preț: 534.14 lei
- 20% Preț: 1029.38 lei
- 18% Preț: 1640.84 lei
- 20% Preț: 914.64 lei
- 20% Preț: 1148.18 lei
- 20% Preț: 931.50 lei
- 18% Preț: 929.86 lei
- 20% Preț: 975.57 lei
- 20% Preț: 631.62 lei
- 20% Preț: 630.29 lei
- 15% Preț: 628.24 lei
- 20% Preț: 634.50 lei
- 20% Preț: 635.00 lei
- 20% Preț: 639.35 lei
- 20% Preț: 629.98 lei
- 20% Preț: 627.42 lei
- 15% Preț: 624.57 lei
- 20% Preț: 803.90 lei
- 18% Preț: 1194.28 lei
- 15% Preț: 621.36 lei
Preț: 626.65 lei
Preț vechi: 737.24 lei
-15% Nou
Puncte Express: 940
Preț estimativ în valută:
119.93€ • 124.57$ • 99.62£
119.93€ • 124.57$ • 99.62£
Carte tipărită la comandă
Livrare economică 01-15 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780387290157
ISBN-10: 038729015X
Pagini: 136
Ilustrații: XVI, 140 p. 20 illus.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.4 kg
Ediția:2006
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
ISBN-10: 038729015X
Pagini: 136
Ilustrații: XVI, 140 p. 20 illus.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.4 kg
Ediția:2006
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
Public țintă
Professional/practitionerCuprins
Graphical Processing Units.- Motivation.- Encryption in GPUs.- Remotely Keyed Cryptographics.- Related Issues.- Extensions.- Conclusions.
Notă biografică
An invited speaker at the 2005 RSA Conference, Cryptographers’ Track, Debra Cook is a Ph.D. student in computer science at Columbia University in New York. Her research interests are focused in applied cryptography. She has a B.S. and M.S.E. in mathematical sciences from the Johns Hopkins University and an M.S. in computer science from Columbia. After graduating from Johns Hopkins, she was a senior technical staff member at Bell Labs and AT&T Labs before pursuing her Ph.D.
Angelos Keromytis is an Assistant Professor of Computer Science at Columbia University. His research interests include design and analysis of network and cryptographic protocols, software security and reliability, and operating system design. He received his Ph.D. in Computer Science from the University of Pennsylvania, and his B.S. in Computer Science from the University of Crete in Greece.
Angelos Keromytis is an Assistant Professor of Computer Science at Columbia University. His research interests include design and analysis of network and cryptographic protocols, software security and reliability, and operating system design. He received his Ph.D. in Computer Science from the University of Pennsylvania, and his B.S. in Computer Science from the University of Crete in Greece.
Textul de pe ultima copertă
CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing units (GPUs), and describes the relevance of GPU-based encryption and decryption to the security of applications involving remote displays.
As a result of the increasing processing power of GPUs, research involving the use of GPUs for general purpose computing has arisen. While GPUs do not support the range of operations found in CPUs, their processing power has grown to exceed that of CPUs and their designs are evolving to increase their programmability. GPUs are especially attractive for applications requiring a large quantity of parallel processing. This work extends such research by considering the use of GPUs as a parallel processor for encrypting data.
The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. While certain operations make it impossible to implement some ciphers in a GPU, the operations used in most block ciphers, including AES, can be performed in GPUs. A detailed description and code for a GPU based implementation of AES is provided.
The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. The motivation for using a GPU as a trusted component, including the applicability to thin-client and remote conferencing applications, is discussed. By enabling encryption and decryption in a GPU, unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system. A prototype implementation of GPU-based decryption for protecting displays exported to untrusted clients is described. Issues and solutions related to fully securing data on untrusted clients, including the protection of user input, are also discussed.
CryptoGraphics: Exploiting Graphics Cards for Securityis designed for a professional audience of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
As a result of the increasing processing power of GPUs, research involving the use of GPUs for general purpose computing has arisen. While GPUs do not support the range of operations found in CPUs, their processing power has grown to exceed that of CPUs and their designs are evolving to increase their programmability. GPUs are especially attractive for applications requiring a large quantity of parallel processing. This work extends such research by considering the use of GPUs as a parallel processor for encrypting data.
The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. While certain operations make it impossible to implement some ciphers in a GPU, the operations used in most block ciphers, including AES, can be performed in GPUs. A detailed description and code for a GPU based implementation of AES is provided.
The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. The motivation for using a GPU as a trusted component, including the applicability to thin-client and remote conferencing applications, is discussed. By enabling encryption and decryption in a GPU, unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system. A prototype implementation of GPU-based decryption for protecting displays exported to untrusted clients is described. Issues and solutions related to fully securing data on untrusted clients, including the protection of user input, are also discussed.
CryptoGraphics: Exploiting Graphics Cards for Securityis designed for a professional audience of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.
Caracteristici
Describes unique approach for disabling spyware Explores the use of a Graphics Processing Unit (GPU) as a trusted system component Provides a detailed description and code for a GPU-based implementation of the AES Highly-regarded in this new research area, Debra Cook was an invited speaker at the 2005 RSA Conference, Cryptographers’ Track Includes supplementary material: sn.pub/extras