Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Exploiting Memory Hardware for Use in Cryptographic Operations

Armstrong, Andrew J. (2017) Exploiting Memory Hardware for Use in Cryptographic Operations. Master's Thesis, University of Pittsburgh. (Unpublished)

Download (1MB) | Preview


Recent data breaches have motivated a desire to remove all trust storage platforms (e.g., the cloud). To this end, research has focused on implementing cryptographic access controls on untrusted storage platforms. However, there are issues with the feasibility of implementing such controls, particularly when revocation (i.e., a user losing permission) occurs. This thesis investigates the opportunity to increase the viability of these systems by exploiting new functionality in emerging main memory technology. Technology such as the Hybrid Memory Cube possess the ability to perform certain computations in-memory, without reading data into the CPU. This thesis focuses on implementing a re-encryption scheme, called keystream re-encryption, that computes a stream of key material that can be XOR-ed in-memory to re-encrypt a file, without ever bringing the contents of that file into the CPU. We show that keystream re-encryption can produce 5-10% improvements in Instructions Per Cycle (IPC), while also increasing throughput by 18% and reducing energy consumption by 44-65%.


Social Networking:
Share |


Item Type: University of Pittsburgh ETD
Status: Unpublished
CreatorsEmailPitt UsernameORCID
Armstrong, Andrew J.aja37@pitt.eduaja37
ETD Committee:
TitleMemberEmail AddressPitt UsernameORCID
Committee ChairLee, Adam J.
Committee MemberChilders, Bruce
Committee MemberMossé, Daniel
Date: 20 January 2017
Date Type: Publication
Defense Date: 8 December 2016
Approval Date: 20 January 2017
Submission Date: 9 December 2016
Access Restriction: No restriction; Release the ETD for access worldwide immediately.
Number of Pages: 47
Institution: University of Pittsburgh
Schools and Programs: Dietrich School of Arts and Sciences > Computer Science
Degree: MS - Master of Science
Thesis Type: Master's Thesis
Refereed: Yes
Uncontrolled Keywords: In-memory computation In-memory cryptography
Date Deposited: 20 Jan 2017 14:12
Last Modified: 21 Jan 2017 06:15


Monthly Views for the past 3 years

Plum Analytics

Actions (login required)

View Item View Item