Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock. Instead routers are used to move data between the cores, and each core uses its own local clock. This implies concu...

Full description

Bibliographic Details
Main Authors: Ali Alzahrani, Fayez Gebali
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8272324/
id doaj-c199b8b932044f03b709ed2e87794129
record_format Article
spelling doaj-c199b8b932044f03b709ed2e877941292021-03-29T20:35:25ZengIEEEIEEE Access2169-35362018-01-0166092610210.1109/ACCESS.2018.27998028272324Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3Ali Alzahrani0https://orcid.org/0000-0001-9501-8331Fayez Gebali1https://orcid.org/0000-0001-5189-3409Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, CanadaDepartment of Electrical and Computer Engineering, University of Victoria, Victoria, BC, CanadaEmbedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock. Instead routers are used to move data between the cores, and each core uses its own local clock. This implies concurrent asynchronous computing. Implementing algorithms in such systems is very much facilitated using dataflow concepts. In this paper, we propose a methodology for implementing algorithms on dataflow platforms. The methodology can be applied to multi-threaded, multi-core platforms or a combination of these platforms as well. This methodology is based on a novel dataflow graph representation of the algorithm. We applied the proposed methodology to obtain a novel dataflow multi-core computing model for the secure hash algorithm-3. The resulting hardware was implemented in field-programmable gate array to verify the performance parameters. The proposed model of computation has advantages, such as flexible I/O timing in term of scheduling policy, execution of tasks as soon as possible, and self-timed event driven system. In other words, I/O timing and correctness of algorithm evaluation are dissociated in this paper. The main advantage of this proposal is ability to dynamically obfuscate algorithm evaluation to thwart side-channel attacks without having to redesign the system. This has important implications for cryptographic applications.https://ieeexplore.ieee.org/document/8272324/DataflowSHA-3keccakhardware dataflowsecurityside-channel attacks
collection DOAJ
language English
format Article
sources DOAJ
author Ali Alzahrani
Fayez Gebali
spellingShingle Ali Alzahrani
Fayez Gebali
Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3
IEEE Access
Dataflow
SHA-3
keccak
hardware dataflow
security
side-channel attacks
author_facet Ali Alzahrani
Fayez Gebali
author_sort Ali Alzahrani
title Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3
title_short Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3
title_full Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3
title_fullStr Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3
title_full_unstemmed Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3
title_sort multi-core dataflow design and implementation of secure hash algorithm-3
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock. Instead routers are used to move data between the cores, and each core uses its own local clock. This implies concurrent asynchronous computing. Implementing algorithms in such systems is very much facilitated using dataflow concepts. In this paper, we propose a methodology for implementing algorithms on dataflow platforms. The methodology can be applied to multi-threaded, multi-core platforms or a combination of these platforms as well. This methodology is based on a novel dataflow graph representation of the algorithm. We applied the proposed methodology to obtain a novel dataflow multi-core computing model for the secure hash algorithm-3. The resulting hardware was implemented in field-programmable gate array to verify the performance parameters. The proposed model of computation has advantages, such as flexible I/O timing in term of scheduling policy, execution of tasks as soon as possible, and self-timed event driven system. In other words, I/O timing and correctness of algorithm evaluation are dissociated in this paper. The main advantage of this proposal is ability to dynamically obfuscate algorithm evaluation to thwart side-channel attacks without having to redesign the system. This has important implications for cryptographic applications.
topic Dataflow
SHA-3
keccak
hardware dataflow
security
side-channel attacks
url https://ieeexplore.ieee.org/document/8272324/
work_keys_str_mv AT alialzahrani multicoredataflowdesignandimplementationofsecurehashalgorithm3
AT fayezgebali multicoredataflowdesignandimplementationofsecurehashalgorithm3
_version_ 1724194610856591360