Data-Oriented Performance Analysis of SHA-3 Candidates on FPGA Accelerated Computers

被引:0
|
作者
Chen, Zhimin [1 ]
Guo, Xu [1 ]
Sinha, Ambuj [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Tech, ECE Dept, Blacksburg, VA 24061 USA
来源
2011 DESIGN, AUTOMATION & TEST IN EUROPE (DATE) | 2011年
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The SHA-3 competition organized by NIST has triggered significant efforts in performance evaluation of cryptographic hardware and software. These benchmarks are used to compare the implementation efficiency of competing hash candidates. However, such benchmarks test the algorithm in an ideal setting, and they ignore the effects of system integration. In this contribution, we analyze the performance of hash candidates on a high-end computing platform consisting of a multi-core Xeon processor with an FPGA-based hardware accelerator. We implement two hash candidates, Keccak and SIMD, in various configurations of multi-core hardware and multi-core software. Next, we vary application parameters such as message length, message multiplicity, and message source. We show that, depending on the application parameter set, the overall system performance is limited by three possible performance bottlenecks, including limitations in computation speed, in communication band-width, and in buffer storage. Our key result is to demonstrate the dependency of these bottlenecks on the application parameters. We conclude that, to make sound system design decisions, selecting the right hash candidate is only half of the solution: one must also understand the nature of the data stream which is hashed.
引用
收藏
页码:1650 / 1655
页数:6
相关论文
共 50 条
  • [21] Hardware Implementations of the SHA-3 Candidates Shabal and Cube Hash
    Bernet, Markus
    Henzen, Luca
    Kaeslin, Hubert
    Felber, Norbert
    Fichtner, Wolfgang
    2009 52ND IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2009, : 515 - 518
  • [22] Compact Hardware Implementation of SHA-3 Finalist Blake on FPGA
    Arsalan, Muhammad
    Ata-ur-Rehman, Muhammad
    Mehmood, Nasir
    Aziz, Arshad
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET 2013), 2013, : 245 - 249
  • [23] Cache Performance Analysis of SHA-3 Hashing Algorithm (BLAKE) and SHA-1
    Ribeiro Junior, Franklin Magalhaes
    Moreno, Edward D.
    Azevedo Dias, Wanderson Roger
    Lima, Felipe dos Anjos
    2012 XXXVIII CONFERENCIA LATINOAMERICANA EN INFORMATICA (CLEI), 2012,
  • [24] Logically Optimized Smallest FPGA Architecture for SHA-3 Core
    Rao, Muzaffar
    Newe, Thomas
    Aziz, Arshad
    COMMUNICATION TECHNOLOGIES, INFORMATION SECURITY AND SUSTAINABLE DEVELOPMENT, 2014, 414 : 195 - 203
  • [25] Algebraic Fault Analysis of SHA-3
    Luo, Pei
    Athanasiou, Konstantinos
    Fei, Yunsi
    Wahl, Thomas
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 151 - 156
  • [26] Length Extension Attack on Narrow-Pipe SHA-3 Candidates
    Gligoroski, Danilo
    ICT INNOVATIONS 2010, 2011, 83 : 5 - 10
  • [27] Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA
    Sideris, Argyrios
    Dasygenis, Minas
    COMPUTATION, 2023, 11 (08)
  • [28] Side Channel Analysis of the SHA-3 Finalists
    Zohner, Michael
    Kasper, Michael
    Stoettinger, Marc
    Huss, Sorin A.
    DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 1012 - 1017
  • [29] Relaxed Differential Fault Analysis of SHA-3
    Nezhad, S. Ehsan Hosiny
    Safkhani, Masoumeh
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 11 (02): : 129 - 143
  • [30] 基于SHA-3的数字签名FPGA实现
    杨亚涛
    杨俊明
    北京电子科技学院学报, 2013, 21 (04) : 9 - 14