Skip to main content

2019 | Buch

Domain Specific High-Level Synthesis for Cryptographic Workloads

verfasst von: Ayesha Khalid, Dr. Goutam Paul, Prof. Anupam Chattopadhyay

Verlag: Springer Singapore

Buchreihe : Computer Architecture and Design Methodologies

insite
SUCHEN

Über dieses Buch

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
This era is witnessing a phenomenal increase in the amount and frequency of the information exchange. The imminent Internet of Things paradigm underpins an network of interconnected devices capable of information processing and dynamic communication with their environment.
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Chapter 2. Background
Abstract
The growth in the consumer market for digital devices goes hand in hand with the demand for enabling more comprehensive functionality, higher performance and lower power budgets from these devices. The mutually conflicting requirements of these increasingly complex systems, coupled with the continuous downscaling of fabrication technology [1], has welcomed the design trend of multi-component heterogeneous systems [2]. Security is one of the increasingly important application required for embedded devices. Unlike the provision/support of a service, security is considered critical enough to be taken now as a design metric for a system, along with other performance metrics such as cost, performance etc [3]. In keeping with the trend of heterogeneity of embedded systems, the computational burden for security applications is often isolated from the central computing resource of a system and levied instead on a separate computing entity dedicated to security applications [4]. Consequently, all major semiconductor IP core vendors offer security services IPs.
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Chapter 3. Dwarfs of Cryptography
Abstract
Here the aim is to develop better performance optimized hardware implementations for the domain of cryptography. Towards this goal, the current chapter first focuses on the necessity of classifying and identifying a range of operations that are representative of a whole range of algorithms for a specific application domain, namely, cryptography.
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Chapter 4. High Level Synthesis for Symmetric Key Cryptography
Abstract
Classification of the major cryptographic functions on the basis of their under-lying basic computational elements yields simplicity and scalability in the design of cryptographic embedded systems. Especially, it benefits their high level synthesis, with performance as good as the hand crafted designs. This chapter discusses the various steps in the HLS tool for block ciphers (called RunFein) and stream ciphers (called RunStream). Several design points in the scope of architectural customizations available to the HLS tool are elaborated. A thorough benchmarking to compare against the hand crafted solutions reveals their performance to be at-par with hand-optimized HDL implementations. The results can be accessed as [13].
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Chapter 5. Manual Optimizations for Efficient Designs
Abstract
Requirement of very high performance (runtime) coupled with limited energy budgets naturally lead to the inclusion of cryptographic accelerators in today’s heterogeneous System-on-Chips (SoCs). Efficient accelerator design, however, needs a deep understanding of the cipher structure as well as hardware optimization principles. In this chapter, we discuss two such custom optimizations, which have been applied to the symmetric-key cryptographic primitives and since, have been integrated into the CRYKET toolflow.
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Chapter 6. Study of Flexibility
Abstract
Security is the most critical part of today’s information systems. Modern applied cryptography in communication networks requires secure kernels that also manifest into low cost and high performance realizations.
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Chapter 7. Study of Scalability
Abstract
A system having Scalability is highly desirable since it promises a proportional performance boost subject to the resource increase provided. In this chapter we try to analyze the extent of scalability various cryptographic workloads can offer. We try to optimally map two eSTREAM (ECRYPT (2012) “eSTREAM: The European Network of Excellence in Cryptology (ECRYPT) Stream Cipher Project.” [1]) finalists stream ciphers, i.e., HC-128 (and HC-256) and Salsa20 on modern Graphics Processor Units (GPUs). On NVIDIAs GPUs we used CUDA programming framework to exploit their many-core architecture on which parallel homogeneous threads are executed in a Single Instruction Multiple Thread (SIMT) fashion. Many cryptographic algorithms, especially block ciphers due to their block wise operations, have reportedly gained remarkable performance speedups on GPUs.
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Chapter 8. Efficient Cryptanalytic Hardware
Abstract
The cryptosystems rely on the hardness of their underlying complex computational problems, that should be unconquerable with ordinary computing machines. Successful cryptanalytic attacks can be launched with the help of custom-built high-performance computing platforms, cryptanalytic weaknesses can aid it further. COPACOBANA is one such custom hardware optimized for executing cryptanalytical Algorithms [1]. Other reported works include General Purpose Processors (GPPs), ASICs, GPUs and ASIPs used as a platform to attack a cryptographic algorithm.
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Chapter 9. Conclusion and Future Work
Abstract
This work is an endeavor to aid a cryptographer in multiple ways. It attempts to expedite the hardware development for a specific application domain, i.e., symmetric key cryptography.
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
Backmatter
Metadaten
Titel
Domain Specific High-Level Synthesis for Cryptographic Workloads
verfasst von
Ayesha Khalid
Dr. Goutam Paul
Prof. Anupam Chattopadhyay
Copyright-Jahr
2019
Verlag
Springer Singapore
Electronic ISBN
978-981-10-1070-5
Print ISBN
978-981-10-1069-9
DOI
https://doi.org/10.1007/978-981-10-1070-5

Neuer Inhalt