An Empirical Study of Cryptographic Libraries for MPI Communications

作者: Abu Naser , Mohsen Gavahi , Cong Wu , Viet Tung Hoang , Zhi Wang

DOI: 10.1109/CLUSTER.2019.8891033

关键词:

摘要: As High Performance Computing (HPC) applications with data security requirements are increasingly moving to execute in the public cloud, there is a demand that cloud infrastructure for HPC should support privacy and integrity. Incorporating integrity mechanisms communication of today’s challenging because recent advances networking centers have shifted bottleneck from network links end points encryption computationally intensive.In this work, we consider incorporating Message Passing Interface (MPI) library, which widely used applications. We empirically study four contemporary cryptographic libraries, OpenSSL, BoringSSL, Libsodium, CryptoPP using micro-benchmarks NAS parallel benchmarks evaluate their overheads encrypting MPI messages on two different technologies, 10Gbps Ethernet 40Gbps InfiniBand. The results indicate (1) performance differs drastically across (2) effectively supporting communications high speed center networks challenging—even most efficient can still introduce very significant some scenarios such as single operation InfiniBand, but (3) overall overhead may not be prohibitive practical uses since multiple concurrent communications.

参考文章(11)
David A. McGrew, John Viega, The Security and Performance of the Galois/Counter Mode (GCM) of Operation Progress in Cryptology - INDOCRYPT 2004. pp. 343- 355 ,(2004) , 10.1007/978-3-540-30556-9_27
Yehuda Lindell, Jonathan Katz, Introduction to Modern Cryptography ,(2007)
Torsten Hoefler, Roberto Belli, Scientific benchmarking of parallel computing systems: twelve ways to tell the masses when reporting performance results ieee international conference on high performance computing data and analytics. pp. 73- ,(2015) , 10.1145/2807591.2807644
M. A. Maffina, R. S. RamPriya, An improved and efficient message passing interface for secure communication on distributed clusters international conference on recent trends in information technology. pp. 329- 334 ,(2013) , 10.1109/ICRTIT.2013.6844225
Xiaojun Ruan, Qing Yang, Mohammed I. Alghamdi, Shu Yin, Xiao Qin, ES-MPICH2: A Message Passing Interface with Enhanced Security IEEE Transactions on Dependable and Secure Computing. ,vol. 9, pp. 361- 374 ,(2012) , 10.1109/TDSC.2012.9
Philip J. Fleming, John J. Wallace, How not to lie with statistics: the correct way to summarize benchmark results Communications of The ACM. ,vol. 29, pp. 218- 221 ,(1986) , 10.1145/5666.5673
Joshua Mason, Kathryn Watkins, Jason Eisner, Adam Stubblefield, A natural language approach to automated cryptanalysis of two-time pads Proceedings of the 13th ACM conference on Computer and communications security - CCS '06. pp. 235- 244 ,(2006) , 10.1145/1180405.1180435
D.H. Bailey, E. Barszcz, J.T. Barton, D.S. Browning, R.L. Carter, L. Dagum, R.A. Fatoohi, P.O. Frederickson, T.A. Lasinski, R.S. Schreiber, H.D. Simon, V. Venkatakrishnan, S.K. Weeratunga, The Nas Parallel Benchmarks ieee international conference on high performance computing data and analytics. ,vol. 5, pp. 63- 73 ,(1991) , 10.1177/109434209100500306
Shridhar Shivaramakrishnan, Sachin D. Babar, Rolling curve ECC for Centralized Key Management System used in ECC-MPICH2 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN). pp. 169- 173 ,(2014) , 10.1109/GCWCN.2014.7030872
Morris J. Dworkin, SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC National Institute of Standards & Technology. ,(2007)