Loading…

ASIP architecture exploration for efficient IPSec encryption: A case study

Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven System-on-Chip (SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting...

Full description

Saved in:
Bibliographic Details
Published in:ACM transactions on embedded computing systems 2007-05, Vol.6 (2), p.12
Main Authors: Scharwaechter, Hanno, Kammler, David, Wieferink, Andreas, Hohenauer, Manuel, Karuri, Kingshuk, Ceng, Jianjiang, Leupers, Rainer, Ascheid, Gerd, Meyr, Heinrich
Format: Article
Language:English
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3
container_end_page
container_issue 2
container_start_page 12
container_title ACM transactions on embedded computing systems
container_volume 6
creator Scharwaechter, Hanno
Kammler, David
Wieferink, Andreas
Hohenauer, Manuel
Karuri, Kingshuk
Ceng, Jianjiang
Leupers, Rainer
Ascheid, Gerd
Meyr, Heinrich
description Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven System-on-Chip (SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting from an initial template. To accomplish this task, design automation tools are used to detect bottlenecks in embedded applications, to implement application-specific processor instructions, and to automatically generate the required software tools (such as instruction-set simulator, C-compiler, assembler, and profiler), as well as to synthesize the hardware. This paper describes an architecture exploration loop for an ASIP coprocessor that implements common encryption functionality used in symmetric block cipher algorithms for internet protocol security (IPSec). The coprocessor is accessed via shared memory and, as a consequence, our approach is easily adaptable to arbitrary main processor architectures. This paper presents the extended version of our case study that has been already published on the SCOPES conference in 2004. In both papers, a MIPS architecture is used as the main processor and Blowfish as encryption algorithm.
doi_str_mv 10.1145/1234675.1234679
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_30983422</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>30983422</sourcerecordid><originalsourceid>FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3</originalsourceid><addsrcrecordid>eNotkE1Lw0AYhBdRsFbPXnPylna_3mwCXkrxI1CwUD2HzeZdXEmzcTcB--9tSU7PDDPMYQh5ZHTFmIQ140JmClYTiyuyYAB5ejZwfdGiSAuaq1tyF-MPpUxxCQvyvDmU-0QH8-0GNMMYMMG_vvVBD853ifUhQWudcdgNSbk_oEmwM-HUX-J7cmN1G_Fh5pJ8vb58bt_T3cdbud3sUsMgG1KecZMJaJpa2FqZHMFqBKwznbMMJbM258YCoqrBCtUIpaRVDQrJtEFeiyV5mnb74H9HjEN1dNFg2-oO_RgrQYtcSM7PxfVUNMHHGNBWfXBHHU4Vo9XlpWp-aWYh_gECJFq-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>30983422</pqid></control><display><type>article</type><title>ASIP architecture exploration for efficient IPSec encryption: A case study</title><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><creator>Scharwaechter, Hanno ; Kammler, David ; Wieferink, Andreas ; Hohenauer, Manuel ; Karuri, Kingshuk ; Ceng, Jianjiang ; Leupers, Rainer ; Ascheid, Gerd ; Meyr, Heinrich</creator><creatorcontrib>Scharwaechter, Hanno ; Kammler, David ; Wieferink, Andreas ; Hohenauer, Manuel ; Karuri, Kingshuk ; Ceng, Jianjiang ; Leupers, Rainer ; Ascheid, Gerd ; Meyr, Heinrich</creatorcontrib><description>Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven System-on-Chip (SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting from an initial template. To accomplish this task, design automation tools are used to detect bottlenecks in embedded applications, to implement application-specific processor instructions, and to automatically generate the required software tools (such as instruction-set simulator, C-compiler, assembler, and profiler), as well as to synthesize the hardware. This paper describes an architecture exploration loop for an ASIP coprocessor that implements common encryption functionality used in symmetric block cipher algorithms for internet protocol security (IPSec). The coprocessor is accessed via shared memory and, as a consequence, our approach is easily adaptable to arbitrary main processor architectures. This paper presents the extended version of our case study that has been already published on the SCOPES conference in 2004. In both papers, a MIPS architecture is used as the main processor and Blowfish as encryption algorithm.</description><identifier>ISSN: 1539-9087</identifier><identifier>EISSN: 1558-3465</identifier><identifier>DOI: 10.1145/1234675.1234679</identifier><language>eng</language><ispartof>ACM transactions on embedded computing systems, 2007-05, Vol.6 (2), p.12</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Scharwaechter, Hanno</creatorcontrib><creatorcontrib>Kammler, David</creatorcontrib><creatorcontrib>Wieferink, Andreas</creatorcontrib><creatorcontrib>Hohenauer, Manuel</creatorcontrib><creatorcontrib>Karuri, Kingshuk</creatorcontrib><creatorcontrib>Ceng, Jianjiang</creatorcontrib><creatorcontrib>Leupers, Rainer</creatorcontrib><creatorcontrib>Ascheid, Gerd</creatorcontrib><creatorcontrib>Meyr, Heinrich</creatorcontrib><title>ASIP architecture exploration for efficient IPSec encryption: A case study</title><title>ACM transactions on embedded computing systems</title><description>Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven System-on-Chip (SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting from an initial template. To accomplish this task, design automation tools are used to detect bottlenecks in embedded applications, to implement application-specific processor instructions, and to automatically generate the required software tools (such as instruction-set simulator, C-compiler, assembler, and profiler), as well as to synthesize the hardware. This paper describes an architecture exploration loop for an ASIP coprocessor that implements common encryption functionality used in symmetric block cipher algorithms for internet protocol security (IPSec). The coprocessor is accessed via shared memory and, as a consequence, our approach is easily adaptable to arbitrary main processor architectures. This paper presents the extended version of our case study that has been already published on the SCOPES conference in 2004. In both papers, a MIPS architecture is used as the main processor and Blowfish as encryption algorithm.</description><issn>1539-9087</issn><issn>1558-3465</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><recordid>eNotkE1Lw0AYhBdRsFbPXnPylna_3mwCXkrxI1CwUD2HzeZdXEmzcTcB--9tSU7PDDPMYQh5ZHTFmIQ140JmClYTiyuyYAB5ejZwfdGiSAuaq1tyF-MPpUxxCQvyvDmU-0QH8-0GNMMYMMG_vvVBD853ifUhQWudcdgNSbk_oEmwM-HUX-J7cmN1G_Fh5pJ8vb58bt_T3cdbud3sUsMgG1KecZMJaJpa2FqZHMFqBKwznbMMJbM258YCoqrBCtUIpaRVDQrJtEFeiyV5mnb74H9HjEN1dNFg2-oO_RgrQYtcSM7PxfVUNMHHGNBWfXBHHU4Vo9XlpWp-aWYh_gECJFq-</recordid><startdate>20070501</startdate><enddate>20070501</enddate><creator>Scharwaechter, Hanno</creator><creator>Kammler, David</creator><creator>Wieferink, Andreas</creator><creator>Hohenauer, Manuel</creator><creator>Karuri, Kingshuk</creator><creator>Ceng, Jianjiang</creator><creator>Leupers, Rainer</creator><creator>Ascheid, Gerd</creator><creator>Meyr, Heinrich</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20070501</creationdate><title>ASIP architecture exploration for efficient IPSec encryption</title><author>Scharwaechter, Hanno ; Kammler, David ; Wieferink, Andreas ; Hohenauer, Manuel ; Karuri, Kingshuk ; Ceng, Jianjiang ; Leupers, Rainer ; Ascheid, Gerd ; Meyr, Heinrich</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Scharwaechter, Hanno</creatorcontrib><creatorcontrib>Kammler, David</creatorcontrib><creatorcontrib>Wieferink, Andreas</creatorcontrib><creatorcontrib>Hohenauer, Manuel</creatorcontrib><creatorcontrib>Karuri, Kingshuk</creatorcontrib><creatorcontrib>Ceng, Jianjiang</creatorcontrib><creatorcontrib>Leupers, Rainer</creatorcontrib><creatorcontrib>Ascheid, Gerd</creatorcontrib><creatorcontrib>Meyr, Heinrich</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM transactions on embedded computing systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Scharwaechter, Hanno</au><au>Kammler, David</au><au>Wieferink, Andreas</au><au>Hohenauer, Manuel</au><au>Karuri, Kingshuk</au><au>Ceng, Jianjiang</au><au>Leupers, Rainer</au><au>Ascheid, Gerd</au><au>Meyr, Heinrich</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ASIP architecture exploration for efficient IPSec encryption: A case study</atitle><jtitle>ACM transactions on embedded computing systems</jtitle><date>2007-05-01</date><risdate>2007</risdate><volume>6</volume><issue>2</issue><spage>12</spage><pages>12-</pages><issn>1539-9087</issn><eissn>1558-3465</eissn><abstract>Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven System-on-Chip (SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting from an initial template. To accomplish this task, design automation tools are used to detect bottlenecks in embedded applications, to implement application-specific processor instructions, and to automatically generate the required software tools (such as instruction-set simulator, C-compiler, assembler, and profiler), as well as to synthesize the hardware. This paper describes an architecture exploration loop for an ASIP coprocessor that implements common encryption functionality used in symmetric block cipher algorithms for internet protocol security (IPSec). The coprocessor is accessed via shared memory and, as a consequence, our approach is easily adaptable to arbitrary main processor architectures. This paper presents the extended version of our case study that has been already published on the SCOPES conference in 2004. In both papers, a MIPS architecture is used as the main processor and Blowfish as encryption algorithm.</abstract><doi>10.1145/1234675.1234679</doi></addata></record>
fulltext fulltext
identifier ISSN: 1539-9087
ispartof ACM transactions on embedded computing systems, 2007-05, Vol.6 (2), p.12
issn 1539-9087
1558-3465
language eng
recordid cdi_proquest_miscellaneous_30983422
source Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)
title ASIP architecture exploration for efficient IPSec encryption: A case study
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T18%3A31%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ASIP%20architecture%20exploration%20for%20efficient%20IPSec%20encryption:%20A%20case%20study&rft.jtitle=ACM%20transactions%20on%20embedded%20computing%20systems&rft.au=Scharwaechter,%20Hanno&rft.date=2007-05-01&rft.volume=6&rft.issue=2&rft.spage=12&rft.pages=12-&rft.issn=1539-9087&rft.eissn=1558-3465&rft_id=info:doi/10.1145/1234675.1234679&rft_dat=%3Cproquest_cross%3E30983422%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=30983422&rft_id=info:pmid/&rfr_iscdi=true