In-Memory Computation Based Mapping of Keccak-f Hash Function

Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data. However, such functions typically require intensive computations with high volume of memory accesses. Novel c...

Full description

Bibliographic Details
Main Authors: Kingra, S.K (Author), Parmar, V. (Author), Suri, M. (Author)
Format: Article
Language:English
Published: Frontiers Media S.A. 2022
Subjects:
SHA
Online Access:View Fulltext in Publisher
LEADER 01824nam a2200229Ia 4500
001 10.3389-fnano.2022.841756
008 220425s2022 CNT 000 0 und d
020 |a 26733013 (ISSN) 
245 1 0 |a In-Memory Computation Based Mapping of Keccak-f Hash Function 
260 0 |b Frontiers Media S.A.  |c 2022 
856 |z View Fulltext in Publisher  |u https://doi.org/10.3389/fnano.2022.841756 
520 3 |a Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data. However, such functions typically require intensive computations with high volume of memory accesses. Novel computing architectures such as logic-in-memory (LIM)/in-memory computing (IMC) have been investigated in the literature to address the limitations of intense compute and memory bottleneck. In this work, we present an implementation of Keccak-f (a state-of-the-art secure hash algorithm) using a variant of simultaneous logic-in-memory (SLIM) that utilizes emerging non-volatile memory (NVM) devices. Detailed operation and instruction mapping on SLIM-based digital gates is presented. Through simulations, we benchmark the proposed approach using LIM cells based on four different emerging NVM devices (OxRAM, CBRAM, PCM, and FeRAM). The proposed mapping strategy when used with state-of-the-art emerging NVM devices offers EDP savings of up to 300× compared to conventional methods. Copyright © 2022 Kingra, Parmar and Suri. 
650 0 4 |a cyber-security 
650 0 4 |a hash functions 
650 0 4 |a in-memory computing 
650 0 4 |a non-volatile memory 
650 0 4 |a SHA 
650 0 4 |a SLIM 
700 1 |a Kingra, S.K.  |e author 
700 1 |a Parmar, V.  |e author 
700 1 |a Suri, M.  |e author 
773 |t Frontiers in Nanotechnology