首页 | 本学科首页   官方微博 | 高级检索  
     


Single-Cycle Bit Permutations with MOMR Execution
Authors:Ruby?B.?Lee  author-information"  >  author-information__contact u-icon-before"  >  mailto:rblee@princeton.edu"   title="  rblee@princeton.edu"   itemprop="  email"   data-track="  click"   data-track-action="  Email author"   data-track-label="  "  >Email author,Xiao?Yang,Zhi-Jie?Jerry?Shi
Affiliation:(1) Department of Electrical Engineering, Princeton University, Princeton, NJ, 08544, U.S.A.;(2) Department of Computer Science and Engineering, University of Connecticut, Storrs, CT, 06269, U.S.A.
Abstract:Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of operations in symmetric-key and public-key cryptographic algorithms that are not common in previous general-purpose workloads: advanced bit operations within a word and multi-word operations. We define MOMR (Multiple Operands Multiple Results) execution or datarich execution as a unified solution to both challenges. It allows arbitrary n-bit permutations to be achieved in one or two cycles, rather than O(n) cycles as in existing RISC processors. It also enables significant acceleration of multiword multiplications needed by public-key ciphers. We propose two implementations of MOMR: one employs only hardware changes while the other uses Instruction Set Architecture (ISA) support. We show that MOMR execution leverages available resources in typical multi-issue processors with minimal additional cost. Multi-issue processors enhanced with MOMR units provide additional speedup over standard multi-issue processors with the same datapath. MOMR is a general architectural solution for word-oriented processor architectures to incorporate datarich operations.
Keywords:permutation   bit permutations   cryptography   cryptographic acceleration   security   multi-word operation  datarich execution   MOMR   instruction set architecture   ISA   processor   high performance secure computing
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《计算机科学技术学报》浏览原始摘要信息
点击此处可从《计算机科学技术学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号