Cryptographic S-boxes (or black boxes) are nonlinear components in symmetric encryption algorithms, and their algebraic properties usually determine the security performance of these encryption algorithms. Differential uniformity, nonlinearity and revised transparency order are three basic indicators to evaluate the security properties of cryptographic S-boxes. They describe the S-box’s ability against differential cryptanalysis, linear cryptanalysis and differential power attack respectively. When the input size of the cryptographic S-box is large (for example, the input length of the S-box is larger than 15 bits), the needed solving time in Central Processing Unit (CPU) is still too long, or even the solution is impracticable. How to evaluate the algebraic properties of the large-size S-box quickly is currently a research hot point in the field. Therefore, a method to evaluate the algebraic properties of cryptographic S-boxes quickly was proposed on the basis of Graphics Processing Unit (GPU). In this method, the kernel functions were split into multiple threads by slicing technique, and an optimization scheme was proposed by combining the characteristics of solving differential uniformity, nonlinearity and revised transparency order to realize parallel computing. Experimental results show that compared with CPU-based implementation environment, single GPU based environment has the implementation efficiency significantly improved. Specifically, the time spent on calculating differential uniformity, nonlinearity, and revised transparency order is saved by 90.28%, 80%, and 66.67% respectively, which verifies the effectiveness of this method.
Aiming at the problems that the existing Data-Leakage Prevention (DLP) solutions are based on generic search for keywords in outgoing data, and hence severely lack the ability to control data flow at a fine granularity with low false probability. In this paper, an DLP architecture based on the white-listing was firstly designed, which used a white-listing for providing the strong security of data transmission. On this basis, a data leakage detection algorithm by combining document fingerprinting with Bloom filters was proposed. This algorithm computed the optimal locations by using dynamic programming to minimize the memory overhead and enable high-speed implementation. The simulation results show that the proposed algorithm for checking the fingerprints for a large amount of documents at very low cost. For example, for 1TB of documents, the proposed solution only requires 340MB memory to achieve worst case expected detection lag (i.e. leakage length) of 1000Bytes.