{"id":119,"date":"2009-06-08T17:24:05","date_gmt":"2009-06-08T16:24:05","guid":{"rendered":"http:\/\/172.22.49.24\/?p=119"},"modified":"2009-06-08T17:24:05","modified_gmt":"2009-06-08T16:24:05","slug":"keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/","title":{"rendered":"Keynote SSTIC 2009 \u2013 Graphics card computing, cryptography and security"},"content":{"rendered":"<p>Presentation :\u00a0<strong>Antoine Joux<\/strong><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Principle\u00a0<\/strong><\/span>: use graphics card processors as a cryptographic accelerator.<br \/>\nThe first implementations date back to 2006, but are not very effective.<br \/>\nSome time later, the gains proved impressive, and the value of this method became apparent.<br \/>\nUltimately, the implementation is quite simple, especially for secret-key cryptography, where the performance gain is<span style=\"text-decoration: underline;\">\u00a0very significant<\/span>\u00a0(up to 20x)<\/p>\n<p>On the other hand, for public key cryptography which requires more substantial calculations, the gain is 20 or 30%, which is not worth it at present, especially since data transfers must be taken into account.<\/p>\n<p>As for cryptanalysis, it&#039;s different.<br \/>\nIn particular, massive parallelization saves significant time without data transfer (as in the case of brute force). This therefore involves pure computing power, with mathematical formulas that apply perfectly to the parallelization of the cards.<\/p>\n<p>Note that not all CPU optimizations are beneficial for a GPU. However, it&#039;s a good idea to optimize the code to maximize the use of basic arithmetic operations (XOR, etc.).<\/p>\n<p>The performance can be really interesting, up to several tens of times faster, depending on the (well) implemented algorithms.<\/p>\n<p>What is its main use?<br \/>\n\u2013 Password cracking is by far the most interesting activity at present, requiring essentially computing power and little data transfer.<br \/>\n\u2013 Recognizing virus signatures can also be an interesting activity (fast, and above all, hidden!)<br \/>\n\u2013 The point above also raises a question: Is the GPU a new host for viruses and parasites?<\/p>","protected":false},"excerpt":{"rendered":"<p>Presentation: Antoine Joux. Principle: using graphics card processors as a cryptographic accelerator. The first [\u2026]<\/p>","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[65],"class_list":["post-119","post","type-post","status-publish","format-standard","hentry","category-veille-securite","tag-sstic"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Keynote SSTIC 2009 - Calcul sur cartes graphiques, cryptographie et s\u00e9curit\u00e9 - INTRINSEC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keynote SSTIC 2009 - Calcul sur cartes graphiques, cryptographie et s\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Pr\u00e9sentation :\u00a0Antoine Joux Principe\u00a0: utiliser les processeurs de cartes graphiques, comme acc\u00e9l\u00e9rateur cryptographique. Les premi\u00e8res [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2009-06-08T16:24:05+00:00\" \/>\n<meta name=\"author\" content=\"Cyrille BARTHELEMY\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyrille BARTHELEMY\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\\\/\"},\"author\":{\"name\":\"Cyrille BARTHELEMY\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/4d0993f0e377e77d13e97f623123e109\"},\"headline\":\"Keynote SSTIC 2009 &#8211; Calcul sur cartes graphiques, cryptographie et s\u00e9curit\u00e9\",\"datePublished\":\"2009-06-08T16:24:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\\\/\"},\"wordCount\":330,\"commentCount\":0,\"keywords\":[\"SSTIC\"],\"articleSection\":[\"Veille S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\\\/\",\"name\":\"Keynote SSTIC 2009 - Calcul sur cartes graphiques, cryptographie et s\u00e9curit\u00e9 - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"datePublished\":\"2009-06-08T16:24:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/4d0993f0e377e77d13e97f623123e109\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keynote SSTIC 2009 &#8211; Calcul sur cartes graphiques, cryptographie et s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/4d0993f0e377e77d13e97f623123e109\",\"name\":\"Cyrille BARTHELEMY\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1ea58be7f50cd5a369de3c03eb2ce4d5d8b053ad42ca848d6cc15a39f6dc605e?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1ea58be7f50cd5a369de3c03eb2ce4d5d8b053ad42ca848d6cc15a39f6dc605e?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1ea58be7f50cd5a369de3c03eb2ce4d5d8b053ad42ca848d6cc15a39f6dc605e?s=96&d=retro&r=g\",\"caption\":\"Cyrille BARTHELEMY\"},\"sameAs\":[\"https:\\\/\\\/www.intrinsec.com\"],\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/cby\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Keynote SSTIC 2009 - Graphics card computing, cryptography and security - INTRINSEC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/","og_locale":"en_US","og_type":"article","og_title":"Keynote SSTIC 2009 - Calcul sur cartes graphiques, cryptographie et s\u00e9curit\u00e9","og_description":"Pr\u00e9sentation :\u00a0Antoine Joux Principe\u00a0: utiliser les processeurs de cartes graphiques, comme acc\u00e9l\u00e9rateur cryptographique. Les premi\u00e8res [&hellip;]","og_url":"https:\/\/www.intrinsec.com\/en\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/","og_site_name":"INTRINSEC","article_published_time":"2009-06-08T16:24:05+00:00","author":"Cyrille BARTHELEMY","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyrille BARTHELEMY","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/"},"author":{"name":"Cyrille BARTHELEMY","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/4d0993f0e377e77d13e97f623123e109"},"headline":"Keynote SSTIC 2009 &#8211; Calcul sur cartes graphiques, cryptographie et s\u00e9curit\u00e9","datePublished":"2009-06-08T16:24:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/"},"wordCount":330,"commentCount":0,"keywords":["SSTIC"],"articleSection":["Veille S\u00e9curit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/","url":"https:\/\/www.intrinsec.com\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/","name":"Keynote SSTIC 2009 - Graphics card computing, cryptography and security - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"datePublished":"2009-06-08T16:24:05+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/4d0993f0e377e77d13e97f623123e109"},"breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/keynote-sstic-2009-calcul-sur-cartes-graphiques-cryptographie-et-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Keynote SSTIC 2009 &#8211; Calcul sur cartes graphiques, cryptographie et s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/4d0993f0e377e77d13e97f623123e109","name":"Cyrille BARTHELEMY","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1ea58be7f50cd5a369de3c03eb2ce4d5d8b053ad42ca848d6cc15a39f6dc605e?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1ea58be7f50cd5a369de3c03eb2ce4d5d8b053ad42ca848d6cc15a39f6dc605e?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1ea58be7f50cd5a369de3c03eb2ce4d5d8b053ad42ca848d6cc15a39f6dc605e?s=96&d=retro&r=g","caption":"Cyrille BARTHELEMY"},"sameAs":["https:\/\/www.intrinsec.com"],"url":"https:\/\/www.intrinsec.com\/en\/author\/cby\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=119"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/119\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}