In-Memory Computation Based Mapping of Keccak-f Hash Function

Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data. However, such functions typically require intensive computations with high volume of memory accesses. Novel c...

Full description

Bibliographic Details
Main Authors: Kingra, S.K (Author), Parmar, V. (Author), Suri, M. (Author)
Format: Article
Language:English
Published: Frontiers Media S.A. 2022
Subjects:
SHA
Online Access:View Fulltext in Publisher
Description
Summary:Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data. However, such functions typically require intensive computations with high volume of memory accesses. Novel computing architectures such as logic-in-memory (LIM)/in-memory computing (IMC) have been investigated in the literature to address the limitations of intense compute and memory bottleneck. In this work, we present an implementation of Keccak-f (a state-of-the-art secure hash algorithm) using a variant of simultaneous logic-in-memory (SLIM) that utilizes emerging non-volatile memory (NVM) devices. Detailed operation and instruction mapping on SLIM-based digital gates is presented. Through simulations, we benchmark the proposed approach using LIM cells based on four different emerging NVM devices (OxRAM, CBRAM, PCM, and FeRAM). The proposed mapping strategy when used with state-of-the-art emerging NVM devices offers EDP savings of up to 300× compared to conventional methods. Copyright © 2022 Kingra, Parmar and Suri.
ISBN:26733013 (ISSN)
DOI:10.3389/fnano.2022.841756