Data-Oriented Performance Analysis of SHA-3 Candidates on FPGA Accelerated Computers

被引:0
|
作者
Chen, Zhimin [1 ]
Guo, Xu [1 ]
Sinha, Ambuj [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Tech, ECE Dept, Blacksburg, VA 24061 USA
来源
2011 DESIGN, AUTOMATION & TEST IN EUROPE (DATE) | 2011年
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The SHA-3 competition organized by NIST has triggered significant efforts in performance evaluation of cryptographic hardware and software. These benchmarks are used to compare the implementation efficiency of competing hash candidates. However, such benchmarks test the algorithm in an ideal setting, and they ignore the effects of system integration. In this contribution, we analyze the performance of hash candidates on a high-end computing platform consisting of a multi-core Xeon processor with an FPGA-based hardware accelerator. We implement two hash candidates, Keccak and SIMD, in various configurations of multi-core hardware and multi-core software. Next, we vary application parameters such as message length, message multiplicity, and message source. We show that, depending on the application parameter set, the overall system performance is limited by three possible performance bottlenecks, including limitations in computation speed, in communication band-width, and in buffer storage. Our key result is to demonstrate the dependency of these bottlenecks on the application parameters. We conclude that, to make sound system design decisions, selecting the right hash candidate is only half of the solution: one must also understand the nature of the data stream which is hashed.
引用
收藏
页码:1650 / 1655
页数:6
相关论文
共 50 条
  • [41] HIGH THROUGHPUT PIPELINED FPGA IMPLEMENTATION OF THE NEW SHA-3 CRYPTOGRAPHIC HASH ALGORITHM
    Athanasiou, George S.
    Makkas, George-Paris
    Theodoridis, Georgios
    2014 6TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING (ISCCSP), 2014, : 538 - 541
  • [42] Hardware Performance Evaluation of SHA-3 Finalists - Blake, Keccak and Skein
    Latif, K.
    Aziz, A.
    Mahboob, A.
    ARAB GULF JOURNAL OF SCIENTIFIC RESEARCH, 2012, 30 (01): : 14 - 22
  • [43] Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
    Lamberger, Mario
    Mendel, Florian
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 68 - 78
  • [44] SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems
    Akiya, Yuta
    Le, Kyle Thomas
    Luong, Megan
    Wilson, Justin C.
    Eddin, Anas Salah
    Formicola, Valerio
    El-Hadedy, Mohamed
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 393 - 398
  • [45] OPTIMIZING FPGA RESOURCE ALLOCATION FOR SHA-3 USING DSP48 AND PIPELINING TECHNIQUES
    Putra, Agfianto eko
    Natan, Oskar
    Istiyanto, Jazi eko
    IIUM ENGINEERING JOURNAL, 2025, 26 (01): : 240 - 253
  • [46] Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models
    Luo, Pei
    Athanasiou, Konstantinos
    Fei, Yunsi
    Wahl, Thomas
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (07) : 1752 - 1761
  • [47] Verifying the SHA-3 Implementation from OpenSSL with the Software Analysis Workbench
    Hanson, Parker
    Winters, Benjamin
    Mercer, Eric
    Decker, Brett
    MODEL CHECKING SOFTWARE, SPIN 2022, 2022, 13255 : 97 - 113
  • [48] Differential Fault Analysis of SHA-3 Under Relaxed Fault Models
    Pei Luo
    Yunsi Fei
    Liwei Zhang
    A. Adam Ding
    Journal of Hardware and Systems Security, 2017, 1 (2) : 156 - 172
  • [49] Reliable Hardware Architectures for the Third-Round SHA-3 Finalist Grostl Benchmarked on FPGA Platform
    Mozaffari-Kermani, Mehran
    Reyhani-Masoleh, Arash
    2011 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT), 2011, : 325 - 331
  • [50] A low-power SHA-3 designs using embedded digital signal processing slice on FPGA
    Kundi, Dur-e-Shahwar
    Aziz, Arshad
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 55 : 138 - 152