Skip to main content
Log in

Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A new method for implementation of symmetric encryption by the GOST (State Standard) 28147–89 algorithm using the technology of NVIDIA CUDA was suggested. The highest-performance option and system parameters providing maximal performance are defined. The effectiveness of the suggested solution as well as a comparative analysis of the given approach with existing solutions is assessed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Boreskov, A.V. and Kharlamov, A.A., Osnovy raboty s tekhnologiei CUDA (Basics of Using the CUDA Technology), DMK-Press, 2010.

    Google Scholar 

  2. Sanders, J. and Kendrot, E., CUDA by Example: An Introduction to General-Purpose GPU Programming, Addison-Wesley Professional, 2011.

    Google Scholar 

  3. CPU and GPU trends over time. http://csgillespie.wordpress.com/2011/01/25/cpu-and-gpu-trends-over-time/.

  4. Karimi, K., Dickson, N.G., and Hamze, F., A Performance Comparison of CUDA. https://arxiv.org/ftp/arxiv/papers/1005/1005.2581.pdf.

  5. NVIDIA CUDA–non-graphical computing on GPUs. http://www.ixbt.com/video3/cuda-1.shtml.

  6. GOST (State Standard) 28147-89: Information Processing Systems. Cryptographic Protection. Cryptographic Transformation Algorithm. http://gostrf.com/normadata/1/4294826/4294826631.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. E. Sukhoparov.

Additional information

Original Russian Text © M.E. Sukhoparov, I.S. Lebedev, 2016, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sukhoparov, M.E., Lebedev, I.S. Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor. Aut. Control Comp. Sci. 50, 792–795 (2016). https://doi.org/10.3103/S0146411616080198

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411616080198

Keywords

Navigation