Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals

被引:7
|
作者
Juliato, Marcio [1 ]
Gebotys, Catherine [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Processor Specialization; HW/SW Partitioning; Custom Instruction; Co-Processor; Cryptography; SHA-2; HMAC; IMPLEMENTATION;
D O I
10.1109/ReConFig.2009.40
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces the specialization of a NIOS2 processor targeting the computation of message authentication codes and integrity checks in constrained environments. Several hardware/software partitioning levels are considered, which vary from simple functions implemented as custom instructions to complete algorithms as peripherals. Our experimental results show that functions Sum, Sig, Ch, Muj implemented as custom instructions allows for SHA-256 and HMAC to be accelerated 1.38 and 1.36 times respectively, while keeping a small area footprint. If the entire SHA-256 algorithm is implemented as a peripheral, the hash computation is performed 11 times faster while decreasing the program size in 16%. Furthermore, the HMAC/SHA-256 peripheral accelerates the computation of a message authentication code 19 times with a 26% smaller program. These results allow for the specialization of the computational platform of constrained embedded systems to the processing requirements of cryptographic applications performing message authentication codes and integrity checks.
引用
收藏
页码:195 / 200
页数:6
相关论文
共 5 条
  • [1] On the Exploitation of a High-Throughput SHA-256 FPGA Design for HMAC
    Michail, Harris E.
    Athanasiou, George S.
    Kelefouras, Vasilis
    Theodoridis, George
    Goutis, Costas E.
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2012, 5 (01)
  • [2] High-speed Pipeline Design for HMAC of SHA-256 with Masking Scheme
    He, Zhenhao
    Wu, Liji
    Zhang, Xiangmin
    PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 174 - 178
  • [3] Custom ASIC Design for SHA-256 Using Open-Source Tools
    Franck, Lucas Daudt
    Ginja, Gabriel Augusto
    Carmo, Joao Paulo
    Afonso, Jose A.
    Luppe, Maximiliam
    COMPUTERS, 2024, 13 (01)
  • [4] Proposal for SZRP Protocol with the Establishment of the Salted SHA-256 Bit HMAC PBKDF2 Advance Security System in a MANET
    Rahman, Md. Torikur
    Mahi, Md. Julkar Nayeen
    2014 1ST INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT 2014), 2014,
  • [5] Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
    Suhaili, Shamsiah
    Julai, Norhuzaimin
    Sapawi, Rohana
    Rajaee, Nordiana
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2024, 32 (01): : 31 - 44