A Canonical Implementation Of The Advanced Encryption Standard On The Graphics Processing Unit
- Pilkington, Nick, Irwin, Barry V W
- Authors: Pilkington, Nick , Irwin, Barry V W
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430007 , vital:72659 , https://digifors.cs.up.ac.za/issa/2008/Proceedings/Research/47.pdf
- Description: This paper will present an implementation of the Advanced Encryption Standard (AES) on the graphics processing unit (GPU). It investigates the ease of implementation from first principles and the difficulties encountered. It also presents a performance analysis to evaluate if the GPU is a viable option for a cryptographics platform. The AES implementation is found to yield orders of maginitude increased performance when compared to CPU based implementations. Although the implementation introduces complica-tions, these are quickly becoming mitigated by the growing accessibility pro-vided by general programming on graphics processing units (GPGPU) frameworks like NVIDIA’s Compute Uniform Device Architechture (CUDA) and AMD/ATI’s Close to Metal (CTM).
- Full Text:
- Date Issued: 2008
- Authors: Pilkington, Nick , Irwin, Barry V W
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430007 , vital:72659 , https://digifors.cs.up.ac.za/issa/2008/Proceedings/Research/47.pdf
- Description: This paper will present an implementation of the Advanced Encryption Standard (AES) on the graphics processing unit (GPU). It investigates the ease of implementation from first principles and the difficulties encountered. It also presents a performance analysis to evaluate if the GPU is a viable option for a cryptographics platform. The AES implementation is found to yield orders of maginitude increased performance when compared to CPU based implementations. Although the implementation introduces complica-tions, these are quickly becoming mitigated by the growing accessibility pro-vided by general programming on graphics processing units (GPGPU) frameworks like NVIDIA’s Compute Uniform Device Architechture (CUDA) and AMD/ATI’s Close to Metal (CTM).
- Full Text:
- Date Issued: 2008
Using inetvis to evaluate snort and bro scan detection on a network telescope
- Irwin, Barry V W, van Riel, J P
- Authors: Irwin, Barry V W , van Riel, J P
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429981 , vital:72656 , https://doi.org/10.1007/978-3-540-78243-8_17
- Description: This paper presents an investigative analysis of net-work scans and scan detection algorithms. Visualisa-tion is employed to review network telescope traffic and identify incidents of scan activity. Some of the identified phenomena appear to be novel forms of host discovery. Scan detection algorithms used by the Snort and Bro intrusion detection systems are cri-tiqued by comparing the visualised scans with alert output. Where human assessment disagrees with the alert output, explanations are sought by analysing the detection algorithms. The Snort and Bro algorithms are based on counting unique connection attempts to destination addresses and ports. For Snort, notable false positive and false negative cases result due to a grossly oversimplified method of counting unique destination addresses and ports.
- Full Text:
- Date Issued: 2008
- Authors: Irwin, Barry V W , van Riel, J P
- Date: 2008
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429981 , vital:72656 , https://doi.org/10.1007/978-3-540-78243-8_17
- Description: This paper presents an investigative analysis of net-work scans and scan detection algorithms. Visualisa-tion is employed to review network telescope traffic and identify incidents of scan activity. Some of the identified phenomena appear to be novel forms of host discovery. Scan detection algorithms used by the Snort and Bro intrusion detection systems are cri-tiqued by comparing the visualised scans with alert output. Where human assessment disagrees with the alert output, explanations are sought by analysing the detection algorithms. The Snort and Bro algorithms are based on counting unique connection attempts to destination addresses and ports. For Snort, notable false positive and false negative cases result due to a grossly oversimplified method of counting unique destination addresses and ports.
- Full Text:
- Date Issued: 2008
The relationship between Accounting 1 and Accounting 3 results
- Mazwi, Zukile, Stack, Elizabeth M
- Authors: Mazwi, Zukile , Stack, Elizabeth M
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: Conference paper
- Identifier: vital:6064 , http://hdl.handle.net/10962/d1004609
- Full Text:
- Date Issued: 2006
- Authors: Mazwi, Zukile , Stack, Elizabeth M
- Date: 2006
- Subjects: To be catalogued
- Language: English
- Type: Conference paper
- Identifier: vital:6064 , http://hdl.handle.net/10962/d1004609
- Full Text:
- Date Issued: 2006
Wearing your PIM: experiments with an audio enhanced PIM
- Tsegaye, Melekam, Bangay, Shaun D, Terzoli, Alfredo
- Authors: Tsegaye, Melekam , Bangay, Shaun D , Terzoli, Alfredo
- Date: 2004
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432854 , vital:72904 , https://www.cs.ru.ac.za/research/g98t4414/static/papers/wpimfinal.pdf
- Description: PIM systems help organise people’s lives by providing address book, schedule and task management facilities. Current PIM’s manage this information by collecting and storing it as textual data. With the advent of the wearable computer, using text only is no longer an efficient and convenient mechanism for managing personal information. A wearable computer should use data from various sensors (video, audio, location, environmental, user state) to organise personal information. In this paper we examine how audio can be used to enhance the facilities provided by text-only PIM’s and present an example implementation of an audio based wearable PIM (wPIM) that has the capability of storing and retrieving PIM information as audio recordings. The results of the user evaluation we conducted, which was carried out outside of the laboratory, suggests that users strongly accept audio as a way to manage their personal information and to augment their memory, supporting our hypothesis that audio enhances wearable personal information management.
- Full Text:
- Date Issued: 2004
- Authors: Tsegaye, Melekam , Bangay, Shaun D , Terzoli, Alfredo
- Date: 2004
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/432854 , vital:72904 , https://www.cs.ru.ac.za/research/g98t4414/static/papers/wpimfinal.pdf
- Description: PIM systems help organise people’s lives by providing address book, schedule and task management facilities. Current PIM’s manage this information by collecting and storing it as textual data. With the advent of the wearable computer, using text only is no longer an efficient and convenient mechanism for managing personal information. A wearable computer should use data from various sensors (video, audio, location, environmental, user state) to organise personal information. In this paper we examine how audio can be used to enhance the facilities provided by text-only PIM’s and present an example implementation of an audio based wearable PIM (wPIM) that has the capability of storing and retrieving PIM information as audio recordings. The results of the user evaluation we conducted, which was carried out outside of the laboratory, suggests that users strongly accept audio as a way to manage their personal information and to augment their memory, supporting our hypothesis that audio enhances wearable personal information management.
- Full Text:
- Date Issued: 2004