skip to main content
10.1145/2851553.2851577acmconferencesArticle/Chapter ViewAbstractPublication PagesicpeConference Proceedingsconference-collections
research-article

End-to-End Java Security Performance Enhancements for Oracle SPARC Servers

Published: 12 March 2016 Publication History

Abstract

In this paper we investigate the performance of cryptographic operations, when used in Java applications. We demonstrate the advantage of using built-in hardware accelerator for cryptographic operations on SPARC servers. In particular, we demonstrate the advantage of hardware cryptographic instructions invoked via AES and SHA intrinsics, implemented in the Java Virtual Machine (JVM), over the more traditional Java Native Interface (JNI) calls. For the purpose of our study, we modified the SPECweb2005 benchmark by adding modern banking requirements, and created a new workload which we call the End-to-End Java Security (EEJS) workload. Using the workload, we compare different Java Cryptographic Service Providers (CSPs) and arrive at the conclusion that hardware cryptography has significant performance advantage for Java applications. With the EEJS workload, we also identify several enhancements applicable to the Java Secure Socket Extension (JSSE).

References

[1]
Kongetira, P. 2004. A 32-way Multithreaded SPARC Processor. In Hot Chips 16.
[2]
Spracklen, L. 2009. Sun's 3rd generation on-chip UltraSPARC security accelerator. In Hot Chips 21.
[3]
Shoaib Bin Altaf, M. and Wood, D.A. 2014. LogCA: A Performance Model for Hardware Accelerators. In Computer Architecture Letters. Volume: PP, Issue: 99 (Sep. 2014).
[4]
SPECweb2005 Release 1.20 Benchmark Design Document. https://www.spec.org/web2005/docs/designdocument.html
[5]
Trademark for the SPEC Benchmark. https://www.spec.org/spec/trademarks.html
[6]
SPEC Fair Use Rule. Academic/research usage. http://www.spec.org/fairuse.html#Academic
[7]
Apache HTTP Client. https://hc.apache.org/httpcomponents-client-ga/
[8]
Java Cryptography Architecture (JCA) Reference Guide. https://docs.oracle.com/javase/8/docs/technotes/guides/security/crypto/CryptoSpec.html
[9]
Java Cryptography Architecture Oracle Providers Documentation for JDK 8. http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html
[10]
Rivest, R.; Shamir, A.; Adleman, L., 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (2): 120--126.
[11]
Announcing the ADVANCED ENCRYPTION STANDARD (AES). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). October, 2012.
[12]
FIPS 180--4: Secure Hash Standard. United States National Institute of Standards and Technology (NIST). August 2015.
[13]
JDK 8 PKCS#11 Reference Guide. http://docs.oracle.com/javase/8/docs/technotes/guides/security/p11guide.html
[14]
Java Secure Socket Extension (JSSE) Reference Guide. https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html
[15]
Oracle Solaris Studio Performance Analyzer. http://www.oracle.com/technetwork/server-storage/solarisstudio/features/performance-analyzer-2292312.html
[16]
Man pages for truss. http://docs.oracle.com/cd/E23823_01/html/816--5165/truss-1.html

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICPE '16: Proceedings of the 7th ACM/SPEC on International Conference on Performance Engineering
March 2016
346 pages
ISBN:9781450340809
DOI:10.1145/2851553
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AES
  2. JSSE
  3. JVM intrinsics
  4. RSA
  5. SHA
  6. SPARC processors
  7. java cryptography performance
  8. java security
  9. specweb2005

Qualifiers

  • Research-article

Conference

ICPE'16

Acceptance Rates

ICPE '16 Paper Acceptance Rate 23 of 74 submissions, 31%;
Overall Acceptance Rate 252 of 851 submissions, 30%

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 98
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media