A Heterogeneous Design Method for Reconfigurable Cryptographic Computing Array

With the development of information technology, the traditional computing architecture can hardly meet the demand of cryptographic computing for flexibility, performance, and security. Nowadays, reconfigurable cryptographic processors have become the mainstream solution to implement cryptographic co...

Full description

Saved in:
Bibliographic Details
Published in2023 International Conference on Networks, Communications and Intelligent Computing (NCIC) pp. 9 - 17
Main Authors Fan, Wang, Liu, Qinrang, Gao, Yanzhao, Qi, Xiaofeng, Wang, Xuan, Yang, Heng
Format Conference Proceeding
LanguageEnglish
Published IEEE 17.11.2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract With the development of information technology, the traditional computing architecture can hardly meet the demand of cryptographic computing for flexibility, performance, and security. Nowadays, reconfigurable cryptographic processors have become the mainstream solution to implement cryptographic computing. Since the existing studies have such issues as hardware resource waste and over-design in computing arrays of processors, we proposed a heterogeneous design method HDCCA (Heterogeneous design of cryptographic computing array) for computing array; Specifically, HDCCA establishes the connection between algorithms and performance, area, and power of the array by mapping and improves the NSGA2 to search the minimum path to meet the computing requirements of cryptographic algorithms. The experimental results show that the solution generated by HDCCA can achieve an area and power saving of more than 10% compared with the homogeneous array and the area efficiency and power efficiency are both improved.
AbstractList With the development of information technology, the traditional computing architecture can hardly meet the demand of cryptographic computing for flexibility, performance, and security. Nowadays, reconfigurable cryptographic processors have become the mainstream solution to implement cryptographic computing. Since the existing studies have such issues as hardware resource waste and over-design in computing arrays of processors, we proposed a heterogeneous design method HDCCA (Heterogeneous design of cryptographic computing array) for computing array; Specifically, HDCCA establishes the connection between algorithms and performance, area, and power of the array by mapping and improves the NSGA2 to search the minimum path to meet the computing requirements of cryptographic algorithms. The experimental results show that the solution generated by HDCCA can achieve an area and power saving of more than 10% compared with the homogeneous array and the area efficiency and power efficiency are both improved.
Author Yang, Heng
Wang, Xuan
Qi, Xiaofeng
Gao, Yanzhao
Fan, Wang
Liu, Qinrang
Author_xml – sequence: 1
  givenname: Wang
  surname: Fan
  fullname: Fan, Wang
  email: Isfanw@163.com
  organization: PLA Information Engineering University, Institute of information technology,Zhengzhou,China
– sequence: 2
  givenname: Qinrang
  surname: Liu
  fullname: Liu, Qinrang
  email: tsaliuqr@163.com
  organization: PLA Information Engineering University, Institute of information technology,Zhengzhou,China
– sequence: 3
  givenname: Yanzhao
  surname: Gao
  fullname: Gao, Yanzhao
  email: buaagaoyz@sina.com
  organization: PLA Information Engineering University, Institute of information technology,Zhengzhou,China
– sequence: 4
  givenname: Xiaofeng
  surname: Qi
  fullname: Qi, Xiaofeng
  email: txqixf@163.com
  organization: PLA Information Engineering University, Institute of information technology,Zhengzhou,China
– sequence: 5
  givenname: Xuan
  surname: Wang
  fullname: Wang, Xuan
  email: wx31cse@gs.zzu.edu.cn
  organization: PLA Information Engineering University, Institute of information technology,Zhengzhou,China
– sequence: 6
  givenname: Heng
  surname: Yang
  fullname: Yang, Heng
  email: 913643960@qq.com
  organization: PLA Information Engineering University, Institute of information technology,Zhengzhou,China
BookMark eNotj8tqwzAURFVoF22aP8hCP2BXDyuSlkZ9JJCkUNp1kORrR5BIRrYX_vsa2tnM5jCceUL3MUVAaENJSSnRLyezN1uquCoZYbwkS9QdWmupFReES6or_YhONd7BCDl1ECFNA36FIXQRH2G8pAa3KeMv8Cm2oZuydVfAJs_9mLps-0vw2KRbP40hdrjO2c7P6KG11wHW_71CP-9v32ZXHD4_9qY-FIFSPRaacycks1aQCpxQrbSaemdl2zhgXllCGi8ZgcWTSV81ZAG33rlKCt5YwVdo87cbAODc53CzeT5TIpiWy9tfuk5M_g
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/NCIC61838.2023.00008
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore Digital Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350371949
EndPage 17
ExternalDocumentID 10529702
Genre orig-research
GrantInformation_xml – fundername: National Key Research and Development Program of China
  grantid: 2022YFB4500901
  funderid: 10.13039/501100012166
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-933b572aa504eb58f7a91cba7fdbe2c8a00dc720e03727c4d05046cbb4753da53
IEDL.DBID RIE
IngestDate Wed May 22 07:08:16 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-933b572aa504eb58f7a91cba7fdbe2c8a00dc720e03727c4d05046cbb4753da53
PageCount 9
ParticipantIDs ieee_primary_10529702
PublicationCentury 2000
PublicationDate 2023-Nov.-17
PublicationDateYYYYMMDD 2023-11-17
PublicationDate_xml – month: 11
  year: 2023
  text: 2023-Nov.-17
  day: 17
PublicationDecade 2020
PublicationTitle 2023 International Conference on Networks, Communications and Intelligent Computing (NCIC)
PublicationTitleAbbrev NCIC
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8538678
Snippet With the development of information technology, the traditional computing architecture can hardly meet the demand of cryptographic computing for flexibility,...
SourceID ieee
SourceType Publisher
StartPage 9
SubjectTerms Computer architecture
cryptographic processors
Design methodology
Hardware
Heterogeneous design
Parallel processing
Pipelines
Program processors
reconfigurable computing
Space exploration
Title A Heterogeneous Design Method for Reconfigurable Cryptographic Computing Array
URI https://ieeexplore.ieee.org/document/10529702
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA66kycVJ_4mB6-daX40zXFUxxQsHhzsNpKXVIbQjdIe5l9vkm6KguAthJCEvISXl3zf9xC6VRa0IZAl0mhIuOUk0RZIIqzjsvIOmumItiiz6Yw_zcV8S1aPXBjnXASfuVEoxr98u4IuPJX5Ey6okkE6ct9Hbj1Za0uHS4m6K4vHIvNbNCC2KIvKhPmPpCnRZ0wOUbkbrYeKvI-61ozg45cQ47-nc4SG3_Q8_PLleI7RnqtPUDnG0wBtWfkd4Xw4j-8jNgM_xxTR2N9NcQg162r51jWBL4WLZrNue8XqJeA-vYPvD4-bRm-GaDZ5eC2myTZZQrJMU9UmijEjJNVaEO6MyCupVQpGy8oaRyHXhFiQlDjC_JUFuCW-YQbGcB-wWC3YKRrUq9qdIcxMVTlmQILJuaVUgc4FMTr88DFL7TkahsVYrHs9jMVuHS7-qL9EB8EggcGXyis0aJvOXXtX3pqbaMJPliyhpA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3LSsNAFB1KXehKxYpvZ6HL1MnkMcnCRUktrW2Dixa6q_OKFCEpaYLUf_FX_DZnJm1FwWXBXRhCYO7cyb135px7ALgJBacMcd8ijHLLFS6yqODI8oR0SaICtEMN2iL2u2P3ceJNauBjw4WRUhrwmWzqR3OXLzJe6qMytcM9HBKEVxjKvly-qQptcd9rq-W8xbjzMIq61kpEwJrZdlhYqmBnHsGUesiVzAsSQkObM0oSwSTmAUVIcIKRRI4K5dwVSL3oc8ZclcgLqkUh1B9-RyUaHq7oYSsCno3CuzjqRb7aFBojhh3TCzH4IdNiolRnH3yu51eBU16bZcGa_P1X68d_a4AD0PgmIMKnTWg9BDWZHoG4BbsavJMpn5dZuYBtgz6BQyOCDVX2DXUxnSazlzLXjDAY5ct5UfXknnFYCVio78FWntNlA4y3MpFjUE-zVJ4A6LAkkQ7jhLPAFRiHnAYeYlTfYToCi1PQ0MafzquOH9O13c_-GL8Gu93RcDAd9OL-OdjTzqD5ija5APUiL-WlSlwKdmXcB4LnbS_XF9AS_6c
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+International+Conference+on+Networks%2C+Communications+and+Intelligent+Computing+%28NCIC%29&rft.atitle=A+Heterogeneous+Design+Method+for+Reconfigurable+Cryptographic+Computing+Array&rft.au=Fan%2C+Wang&rft.au=Liu%2C+Qinrang&rft.au=Gao%2C+Yanzhao&rft.au=Qi%2C+Xiaofeng&rft.date=2023-11-17&rft.pub=IEEE&rft.spage=9&rft.epage=17&rft_id=info:doi/10.1109%2FNCIC61838.2023.00008&rft.externalDocID=10529702