Data-Oriented Performance Analysis of SHA-3 Candidates on FPGA Accelerated Computers

被引:0
|
作者
Chen, Zhimin [1 ]
Guo, Xu [1 ]
Sinha, Ambuj [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Tech, ECE Dept, Blacksburg, VA 24061 USA
来源
2011 DESIGN, AUTOMATION & TEST IN EUROPE (DATE) | 2011年
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The SHA-3 competition organized by NIST has triggered significant efforts in performance evaluation of cryptographic hardware and software. These benchmarks are used to compare the implementation efficiency of competing hash candidates. However, such benchmarks test the algorithm in an ideal setting, and they ignore the effects of system integration. In this contribution, we analyze the performance of hash candidates on a high-end computing platform consisting of a multi-core Xeon processor with an FPGA-based hardware accelerator. We implement two hash candidates, Keccak and SIMD, in various configurations of multi-core hardware and multi-core software. Next, we vary application parameters such as message length, message multiplicity, and message source. We show that, depending on the application parameter set, the overall system performance is limited by three possible performance bottlenecks, including limitations in computation speed, in communication band-width, and in buffer storage. Our key result is to demonstrate the dependency of these bottlenecks on the application parameters. We conclude that, to make sound system design decisions, selecting the right hash candidate is only half of the solution: one must also understand the nature of the data stream which is hashed.
引用
收藏
页码:1650 / 1655
页数:6
相关论文
共 50 条
  • [1] Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures
    Bos, Joppe W.
    Stefan, Deian
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 279 - +
  • [2] Performance Analysis of Modified SHA-3
    Chandran, Nithin R.
    Manuel, Ebin M.
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 904 - 910
  • [3] Side-Channel Analysis of Six SHA-3 Candidates
    Benoit, Olivier
    Peyrin, Thomas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 140 - 157
  • [4] Lightweight Implementations of SHA-3 Candidates on FPGAs
    Kaps, Jens-Peter
    Yalla, Panasayya
    Surapathi, Kishore Kumar
    Habib, Bilal
    Vadlamudi, Susheel
    Gurung, Smriti
    Pham, John
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 270 - 289
  • [5] Integral Distinguishers of Some SHA-3 Candidates
    Minier, Marine
    Phan, Raphael C. -W.
    Pousse, Benjamin
    CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 106 - +
  • [6] FPGA Implementations of SHA-3 Candidates: CubeHash, Grostl, LANE, Shabal and Spectral Hash
    Baldwin, Brian
    Byrne, Andrew
    Hamilton, Mark
    Hanley, Neil
    McEvoy, Robert P.
    Pan, Weibo
    Marnane, William P.
    PROCEEDINGS OF THE 2009 12TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN, ARCHITECTURES, METHODS AND TOOLS, 2009, : 783 - 790
  • [7] Improving FPGA based SHA-3 structures
    Sundal, Magnus
    Chaves, Ricardo
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 159 - 159
  • [8] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
    Ioannou, Lenos
    Michail, Harris E.
    Voyiatzis, Artemios G.
    2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 68 - 71
  • [9] Serialized lightweight SHA-3 FPGA implementations
    Jungk, Bernhard
    Stoettinger, Marc
    MICROPROCESSORS AND MICROSYSTEMS, 2019, 71
  • [10] An FPGA implementation of the SHA-3: The BLAKE Hash Function
    Kahri, Fatma
    Bouallegue, Belgacem
    Machhout, Mohsen
    Tourki, Rached
    2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,