首页 | 本学科首页   官方微博 | 高级检索  
     

基于拟态计算机的SHA512算法高吞吐量实现
引用本文:席胜鑫,张文宁,周清雷,斯雪明,李斌. 基于拟态计算机的SHA512算法高吞吐量实现[J]. 计算机工程与科学, 2018, 40(8): 1344-1350
作者姓名:席胜鑫  张文宁  周清雷  斯雪明  李斌
作者单位:(1.郑州大学信息工程学院,河南 郑州 450001;2.中原工学院软件学院,河南 郑州 450007;3.解放军信息工程大学信息工程学院,河南 郑州 450002)
基金项目:国家自然科学基金(61250007);国家863计划(2009AA012201)
摘    要:哈希函数SHA512是一种目前广泛使用的加密算法,在现代加密学中占据很重要的地位。鉴于拟态计算机高性能和高效能的特点,对SHA512算法进行了深入分析,提出了基于拟态计算机的全流水线结构的实现方案。为了提高算法的运算速率,在关键路径对加法运算进行了优化,并且配合全流水线结构,减少了加密一个数据分组所需要的时钟周期数,提高了数据吞吐率。在拟态计算机上实际运行,芯片工作在130 MHz的时钟频率下,数据吞吐率达到133 120 Mbits/s,性能得到了显著提高,且能效比高于通用服务器的能效比。

关 键 词:哈希函数  SHA512  拟态计算机  全流水结构  CSA  
收稿时间:2017-03-10
修稿时间:2018-08-25

High throughput implementation ofSHA512 on mimic computers
XI Sheng xin,ZHANG Wen ning,ZHOU Qing lei,SI Xue ming,LI Bin. High throughput implementation ofSHA512 on mimic computers[J]. Computer Engineering & Science, 2018, 40(8): 1344-1350
Authors:XI Sheng xin  ZHANG Wen ning  ZHOU Qing lei  SI Xue ming  LI Bin
Affiliation:(1.School of Information Engineering,Zhengzhou University,Zhengzhou 450001;2.College of Software,Zhongyuan University of Technology,Zhengzhou 450007;3.School of Information Engineering,The PLA Information Engineering University,Zhengzhou 450002,China)
Abstract:Hash function SHA512 is a widely used encryption algorithm and plays an important role in modern cryptography. Considering the high performance and high energy efficiency of mimic computer and analyzing SHA512 deeply, an implementation scheme of full pipeline structure based on the mimic computer is proposed. To improve the computing speed,the structure of adders on the critical paths is optimized. With the full pipeline structure,the number of clock cycles needed to encrypt a data packet is reduced, and the data throughput is improved.Its actual running on the mimic computer shows that the chip can work at the clock frequency of 130 MHz and achieves the throughput of 133 120 Mbits/s, so the performance is significantly improved, and its energy efficiency is higher than that of the general server.
Keywords:Hash algorithm  SHA512  mimic computer  full pipeline  CSA  
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号