Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)

Buy

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs for general purpose computing has arisen. This work extends such research by considering the use of a GPU as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. A detailed description for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system.

The focus of this book is the use of graphics processing units (GPUs) for cryptographies operations, hence the term CryptoGraphics. The computing power of GPUs has increased substantially over the past several years to the point that GPUs are more efficient than CPUs for certain tasks. As a result, even though GPUs are not intended to be general purpose processors, researchers have begun to study the use of GPUs for non-graphics applications. In most cases, the goal is to increase the rate at which computations can be performed by an application by using the GPU for specific types of calculations. Applications that are well suited to run in a GPU use data representations and types that are compatible with the GPU's abstraction of pixels. Compatible computations involve operations that take a single pixel's value, apply a simple function to it and output the result as a new pixel value. Parallel processing on multiple data sets can be performed by using multiple sets of pixels to represent the data sets and by applying the application simultaneously to each set and/or by treating each color component of a pixel as a separate set of data and applying the algorithm in parallel to each color component.

(HTML tags aren't allowed.)

Sams Teach Yourself Microsoft Access 2002 Programming in 24 Hours
Sams Teach Yourself Microsoft Access 2002 Programming in 24 Hours
Sams Teach Yourself Access 2002 Programming in 24 Hours will considerably improve the quality of the database applications that the reader can create with Microsoft Access. Concise tutorials that quickly bring the reader up to speed will be the goal of each chapter. Having completed this book, the readers will be able to understand any sample VBA...
IBM Data Warehousing: With IBM Business Intelligence Tools
IBM Data Warehousing: With IBM Business Intelligence Tools
Architects, project planners, and sponsors are always dealing with multiple technologies, conflicting techniques, and competing business agendas. This combination of issues gives rise to many challenges facing business intelligence (BI) and data warehouse (DW) initiatives. The question you need to ask yourself is this: “Do I have the...
Data Model Patterns: Conventions of Thought
Data Model Patterns: Conventions of Thought

Learning the basics of a modeling technique is not the same as learning how to use and apply it. To develop a data model of an organization is to gain insights into its nature that do not come easily. Indeed, analysts are often expected to understand subtleties of an organization's structure that may have evaded people who have worked there...


Second-Generation HTS Conductors
Second-Generation HTS Conductors
The discovery of high temperature superconductors (HTS) in 1986 by two IBM
scientists led to an unprecedented explosion of research and development efforts
world-wide because of the significant potential for practical applications offered by
these materials. However, the early euphoria created by the exciting prospects was...
Adopting the Racing Greyhound
Adopting the Racing Greyhound

The first edition of this book was responsible for inspiring tens of thousands of people to adopt ex-racers. Now, this fully updated edition features groundbreaking veterinary information not available anywhere else. Greyhound authority Cynthia Branigan–who has placed over 4,000 Greyhounds through her organization–offers updated...

Pro Arduino (Technology in Action)
Pro Arduino (Technology in Action)

So, you've created a few projects with Arduino, and now it's time to kick it up a notch. Where do you go next? With Pro Arduino, you'll learn about new tools, techniques, and frameworks to make even more ground-breaking, eye-popping projects.

You'll discover how to make Arduino-based gadgets and robots...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy