首页> 外文期刊>IEEE Transactions on Computers >Vector Instruction Set Extensions for Efficient Computation of Keccak
【24h】

Vector Instruction Set Extensions for Efficient Computation of Keccak

机译:向量指令集扩展,用于Keccak的高效计算

获取原文
获取原文并翻译 | 示例

摘要

We investigate the design of a new instruction set for the KECCAK permutation, a cryptographic kernel for hashing, authenticated encryption, keystream generation and random-number generation. KECCAK is the basis of the SHA-3 standard and the newly proposed KEYAK and KETJE authenticated ciphers. We develop the instruction extensions for a 128-bit interface, commonly available in the vector-processing unit of many modern processors. We examine the trade-off between flexibility and efficiency, and we propose a set of six custom instructions to support a broad range of KECCAK-based cryptographic applications. We motivate our custom-instruction selections using a design space exploration that considers various methods of partitioning the state and the operations of the KECCAK permutation, and we demonstrate an efficient implementation of this permutation with the proposed instructions. To evaluate their performance, we integrate a simulation model of the proposed ARM NEON vector instructions into the GEM5 micro-architecture simulator. With this simulation model, we evaluate the performance improvement for several cryptographic operations that use the KECCAK permutation. Compared to a state-of-the-art NEON software implementation, we demonstrate a performance improvement of 2.2x for SHA-3. Compared to optimized 32-bit assembly programming, we demonstrate a performance improvement of 2.6x, 1.6x, and 1.4x for RIVER KEYAK, KETJESR and KETJEJR respectively. The proposed instructions require 4,658 gate-equivalent (GE) in 90 nm, which represents only a tiny fraction of the hardware cost of a modern processor.
机译:我们研究了针对KECCAK排列的新指令集的设计,该算法是用于散列,认证加密,密钥流生成和随机数生成的加密内核。 KECCAK是SHA-3标准以及新提出的KEYAK和KETJE认证密码的基础。我们开发了128位接口的指令扩展,通常在许多现代处理器的矢量处理单元中都可以使用。我们研究了灵活性和效率之间的权衡,并提出了一套六个自定义指令集,以支持各种基于KECCAK的加密应用程序。我们使用设计空间探索来激发我们的自定义指令选择,该设计空间探索考虑了对KECCAK置换的状态和操作进行分区的各种方法,并且我们通过提出的指令演示了此置换的有效实现。为了评估它们的性能,我们将拟议的ARM NEON向量指令的仿真模型集成到GEM5微体系结构仿真器中。通过此仿真模型,我们评估了使用KECCAK排列的几种密码运算的性能改进。与最新的NEON软件实现相比,我们证明SHA-3的性能提高了2.2倍。与优化的32位汇编编程相比,我们证明RIVER KEYAK,KETJESR和KETJEJR的性能分别提高了2.6倍,1.6倍和1.4倍。拟议的指令在90 nm内需要4,658个门等效(GE),这仅占现代处理器硬件成本的一小部分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号