Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Exploiting Memory Hardware for Use in Cryptographic Operations

Armstrong, Andrew J. (2017) Exploiting Memory Hardware for Use in Cryptographic Operations. Master's Thesis, University of Pittsburgh. (Unpublished)

[img]
Preview
PDF
Download (1MB) | Preview

Abstract

Recent data breaches have motivated a desire to remove all trust storage platforms (e.g., the cloud). To this end, research has focused on implementing cryptographic access controls on untrusted storage platforms. However, there are issues with the feasibility of implementing such controls, particularly when revocation (i.e., a user losing permission) occurs. This thesis investigates the opportunity to increase the viability of these systems by exploiting new functionality in emerging main memory technology. Technology such as the Hybrid Memory Cube possess the ability to perform certain computations in-memory, without reading data into the CPU. This thesis focuses on implementing a re-encryption scheme, called keystream re-encryption, that computes a stream of key material that can be XOR-ed in-memory to re-encrypt a file, without ever bringing the contents of that file into the CPU. We show that keystream re-encryption can produce 5-10% improvements in Instructions Per Cycle (IPC), while also increasing throughput by 18% and reducing energy consumption by 44-65%.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: University of Pittsburgh ETD
Status: Unpublished
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Armstrong, Andrew J.aja37@pitt.eduaja37
ETD Committee:
TitleMemberEmail AddressPitt UsernameORCID
Committee ChairLee, Adam J.
Committee MemberChilders, Bruce
Committee MemberMossé, Daniel
Date: 20 January 2017
Date Type: Publication
Defense Date: 8 December 2016
Approval Date: 20 January 2017
Submission Date: 9 December 2016
Access Restriction: No restriction; Release the ETD for access worldwide immediately.
Number of Pages: 47
Institution: University of Pittsburgh
Schools and Programs: Dietrich School of Arts and Sciences > Computer Science
Degree: MS - Master of Science
Thesis Type: Master's Thesis
Refereed: Yes
Uncontrolled Keywords: In-memory computation In-memory cryptography
Date Deposited: 20 Jan 2017 14:12
Last Modified: 21 Jan 2017 06:15
URI: http://d-scholarship.pitt.edu/id/eprint/30532

Metrics

Monthly Views for the past 3 years

Plum Analytics


Actions (login required)

View Item View Item