Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3
Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock. Instead routers are used to move data between the cores, and each core uses its own local clock. This implies concu...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8272324/ |
id |
doaj-c199b8b932044f03b709ed2e87794129 |
---|---|
record_format |
Article |
spelling |
doaj-c199b8b932044f03b709ed2e877941292021-03-29T20:35:25ZengIEEEIEEE Access2169-35362018-01-0166092610210.1109/ACCESS.2018.27998028272324Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3Ali Alzahrani0https://orcid.org/0000-0001-9501-8331Fayez Gebali1https://orcid.org/0000-0001-5189-3409Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, CanadaDepartment of Electrical and Computer Engineering, University of Victoria, Victoria, BC, CanadaEmbedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock. Instead routers are used to move data between the cores, and each core uses its own local clock. This implies concurrent asynchronous computing. Implementing algorithms in such systems is very much facilitated using dataflow concepts. In this paper, we propose a methodology for implementing algorithms on dataflow platforms. The methodology can be applied to multi-threaded, multi-core platforms or a combination of these platforms as well. This methodology is based on a novel dataflow graph representation of the algorithm. We applied the proposed methodology to obtain a novel dataflow multi-core computing model for the secure hash algorithm-3. The resulting hardware was implemented in field-programmable gate array to verify the performance parameters. The proposed model of computation has advantages, such as flexible I/O timing in term of scheduling policy, execution of tasks as soon as possible, and self-timed event driven system. In other words, I/O timing and correctness of algorithm evaluation are dissociated in this paper. The main advantage of this proposal is ability to dynamically obfuscate algorithm evaluation to thwart side-channel attacks without having to redesign the system. This has important implications for cryptographic applications.https://ieeexplore.ieee.org/document/8272324/DataflowSHA-3keccakhardware dataflowsecurityside-channel attacks |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ali Alzahrani Fayez Gebali |
spellingShingle |
Ali Alzahrani Fayez Gebali Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3 IEEE Access Dataflow SHA-3 keccak hardware dataflow security side-channel attacks |
author_facet |
Ali Alzahrani Fayez Gebali |
author_sort |
Ali Alzahrani |
title |
Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3 |
title_short |
Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3 |
title_full |
Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3 |
title_fullStr |
Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3 |
title_full_unstemmed |
Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3 |
title_sort |
multi-core dataflow design and implementation of secure hash algorithm-3 |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock. Instead routers are used to move data between the cores, and each core uses its own local clock. This implies concurrent asynchronous computing. Implementing algorithms in such systems is very much facilitated using dataflow concepts. In this paper, we propose a methodology for implementing algorithms on dataflow platforms. The methodology can be applied to multi-threaded, multi-core platforms or a combination of these platforms as well. This methodology is based on a novel dataflow graph representation of the algorithm. We applied the proposed methodology to obtain a novel dataflow multi-core computing model for the secure hash algorithm-3. The resulting hardware was implemented in field-programmable gate array to verify the performance parameters. The proposed model of computation has advantages, such as flexible I/O timing in term of scheduling policy, execution of tasks as soon as possible, and self-timed event driven system. In other words, I/O timing and correctness of algorithm evaluation are dissociated in this paper. The main advantage of this proposal is ability to dynamically obfuscate algorithm evaluation to thwart side-channel attacks without having to redesign the system. This has important implications for cryptographic applications. |
topic |
Dataflow SHA-3 keccak hardware dataflow security side-channel attacks |
url |
https://ieeexplore.ieee.org/document/8272324/ |
work_keys_str_mv |
AT alialzahrani multicoredataflowdesignandimplementationofsecurehashalgorithm3 AT fayezgebali multicoredataflowdesignandimplementationofsecurehashalgorithm3 |
_version_ |
1724194610856591360 |