Architectural Analysis of Cryptographic Applications for Network Processors

نویسندگان

  • Haiyong Xie
  • Li Zhou
  • Laxmi Bhuyan
چکیده

Network processors are application specific programmable processors and will become critical components of next-generation networking equipment. As Internet expands exponentially, the need for secure communication increases very quickly. The performance of communication applications including packet processing and cryptographic applications on network processors thus becomes an important issue of network processor system design. In this paper, we compare and analyze the architectural characteristics of many widespread cryptographic algorithms and their implementations through simulation on a MIPS-like architecture. We find that the instruction mix is different from SPEC95 programs; and that the average size of basic blocks is 2~3 times larger than that of common applications. Only 7% of instructions are conditional branches and most of them are taken. Most of the cryptographic applications have an ILP of 8. Most of the applications have small kernels of less than 16KB. Memory system has much less important effect on the overall performance. We find that only a small direct-map instruction cache and data cache are needed to achieve comparable performance. Cache replacement strategy is not important to the overall performance. The results in this paper are helpful to the design of network processors.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Adding Security to Network Via Network Processors

With the increasing need of security, cryptographic processing becomes a crucial issue for network devices. Traditionally security functions are implemented with Application Specific Integrated Circuit (ASIC) or GeneralPurposed Processors (GPPs). Network processors (NPs) are emerging as a programmable alternative to the conventional solutions to deliver high performance and flexibility at moder...

متن کامل

This Work Compares and Analyzes Architectural Characteristics of Many Widespread Cryptographic Algorithms on the Intel Ixp2800 Network Processor. It Also Investigates Several Implementation and Optimization Principles That Can Improve Overall

0272-1732/04/$20.00 © 2004 IEEE Published by the IEEE computer Society Information security is an indispensable concern owing to the growing demands for trusted communication and electronic commerce. For example, applications such as those for secure IP (IPSec) and virtual private networks (VPNs) have been widely deployed in nodal processing. On the other hand, network processors that provide a...

متن کامل

Cryptographic Support in a Gigabit Network

Many applications envisioned for ultra-high-speed networks require cryptographic transformations for data in transit. Security has often been an afterthought, and cryptographic support has generally not kept pace with performance increases in other network components. Two distinct experimental prototypes of high-speed DES boards were built to understand architectural issues in providing cryptog...

متن کامل

Architectural Implications of Cache Coherence Protocols with Network Applications on Chip MultiProcessors

Network processors are specialized integrated circuits used to process packets in such network equipment as core routers, edge routers, and access routers. As predicted by Gilder’s law, Internet traffic has doubled each year since 1997 and this trend is showing no signs of abating. Since all emerging network applications which require deep packet classification and security-related processing s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002