期刊文献+

Skein树形哈希算法的并行实现与性能评估(英文)

A Parallel Implementation and Performance Evaluation of Skein Tree Hashing
原文传递
导出
摘要 Skein算法提供一种树形哈希模式,方便了并行硬件资源的充分利用.提出一种并行计算平台,用以评估树形哈希算法与传统线性哈希算法相比的性能提升.该平台通过开关网络连接多个运算单元和多个存储单元,允许并行运算和并发的存储器访问.平台中包含一个控制器,负责动态地向运算单元调度任务,支持算法参数的灵活配置.为了确定最优配置参数,根据平台特征建立了性能模型.实验结果显示,加速比趋近于理论上限,即平台中运算单元的数量.该平台的硬件原型通过台积电65 nm工艺进行综合,工作频率达到833 MHz,对应吞吐率为38.091 Gbps. Skein algorithm provides a tree hashing mode to make full use of parallel hardware resources. A platform with parallel architecture is presented to evaluate the performance improvement of tree hashing over normal serial hashing. This platform connects multiple execution units and memory units using a switch network, enabling concurrent computations and memory accesses. A controller in the platform performs the task scheduling for execution units dynamically, supporting the flexible parameter selection in tree hashing. To determine the optimal parameter selection, a performance model has been developed aiming at this platform. Experiments reveal that the speedup ratio achieved could approach to the theoretical upper bound with respect to the number of execution units. The hardware prototype of the proposed platform is synthesized in TSMC 65 nm CMOS process. It achieves a throughput of 38. 091 Gbps at the working frequency of 833 MHz.
出处 《复旦学报(自然科学版)》 CAS CSCD 北大核心 2014年第1期37-50,共14页 Journal of Fudan University:Natural Science
基金 Project supported by the State Key Program of National Natural Science of China(61234002)
关键词 SHA-3 Skein算法 树形哈希 并行硬件实现 性能模型 SHA-3 skein tree hashing parallel implementation performance model
  • 相关文献

参考文献15

  • 1Wikimedia Foundation, Inc. Sha-I[EB/OL]. Wikipedia. 2012-07. http://en, wikipedia, org/wiki/SHA- 1/2013-04-11.
  • 2Cochran 1VL 263 SHA-1 differential path[R/OL] Cryptology ePrint Archive, Report 2007/474, 2007. http://eprint, iacr. org/2013-04-11.
  • 3Manuel S. Classification and generation of disturbance vectors for collision attacks against SHA1 [J]. Designs, Codes and Cryptography, 2011,59.- 247-263.
  • 4The ECRYPT Hash Function Website. The sha-3 zoo[EB/OL]. 2011-05. http..//ehash, iaik. tugraz, at/ wiki/The SHA-3_Zoo/2013-04-11.
  • 5Knezevic M, Kobayashi K, Ikegami J, et al. Fair and consistent hardware evaluation of fourteen round two sha-3 candidates[J] IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2012,20 (5) : 827-840.
  • 6Henzen L, Aumasson J P, Meier W, et al. VLSI characterization of the cryptographic hash function blake[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2011, 19(10): 1746-1754.
  • 7Ferguson N, Lucks S, Schneier B, et al. The skein hash function family[EB/OL]. 2010-10. http:// www. skein-hash, info/2013-04-11.
  • 8Webster D M. Versatile FPGA architecture for skein hashing algorithm[D]. Rochester , New York: Rochester Institute of Technology. 2011-06.
  • 9Schorr A. Performance analysis of a scalable hardware FPGA skein implementation[D]. Rochester , New York: Rochester Institute of Technology. 2010-02.
  • 10Schorr A, Lukowiak M. Skein tree hashing on FPGA[C]. International Conference on Reconfigurable Computing and FPGAs (ReConFig). Los Alamitos, California: IEEE Computer Society, 2010, 12: 292-297.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部