Author:
Kingra Sandeep Kaur,Parmar Vivek,Suri Manan
Abstract
Cryptographic hash functions play a central role in data security for applications such as message authentication, data verification, and detecting malicious or illegal modification of data. However, such functions typically require intensive computations with high volume of memory accesses. Novel computing architectures such as logic-in-memory (LIM)/in-memory computing (IMC) have been investigated in the literature to address the limitations of intense compute and memory bottleneck. In this work, we present an implementation of Keccak-f (a state-of-the-art secure hash algorithm) using a variant of simultaneous logic-in-memory (SLIM) that utilizes emerging non-volatile memory (NVM) devices. Detailed operation and instruction mapping on SLIM-based digital gates is presented. Through simulations, we benchmark the proposed approach using LIM cells based on four different emerging NVM devices (OxRAM, CBRAM, PCM, and FeRAM). The proposed mapping strategy when used with state-of-the-art emerging NVM devices offers EDP savings of up to 300× compared to conventional methods.
Funder
Science and Engineering Research Board
Principal Scientific Adviser to the Government of India
Department of Science and Technology, Ministry of Science and Technology, India
Reference48 articles.
1. Design and Evaluation of a Spintronic In-Memory Processing Platform for Nonvolatile Data Encryption;Angizi;IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.,2018
2. Hash Function Balance and its Impact on Birthday Attacks;Bellare;IACR Cryptol. Eprint Arch.,2003
3. Keccak;Bertoni,2013
4. SHA-3 Implementation Using ReRAM Based In-Memory Computing Architecture;Bhattacharjee,2017
5. Neuromorphic Computing with Multi-Memristive Synapses;Boybat;Nat. Commun.,2018