Loading…
ASIP architecture exploration for efficient IPSec encryption: A case study
Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven System-on-Chip (SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting...
Saved in:
Published in: | ACM transactions on embedded computing systems 2007-05, Vol.6 (2), p.12 |
---|---|
Main Authors: | , , , , , , , , |
Format: | Article |
Language: | English |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3 |
container_end_page | |
container_issue | 2 |
container_start_page | 12 |
container_title | ACM transactions on embedded computing systems |
container_volume | 6 |
creator | Scharwaechter, Hanno Kammler, David Wieferink, Andreas Hohenauer, Manuel Karuri, Kingshuk Ceng, Jianjiang Leupers, Rainer Ascheid, Gerd Meyr, Heinrich |
description | Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven
System-on-Chip
(SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting from an initial template. To accomplish this task, design automation tools are used to detect bottlenecks in embedded applications, to implement application-specific processor instructions, and to automatically generate the required software tools (such as instruction-set simulator, C-compiler, assembler, and profiler), as well as to synthesize the hardware. This paper describes an architecture exploration loop for an ASIP coprocessor that implements common encryption functionality used in symmetric block cipher algorithms for internet protocol security (IPSec). The coprocessor is accessed via shared memory and, as a consequence, our approach is easily adaptable to arbitrary main processor architectures. This paper presents the extended version of our case study that has been already published on the SCOPES conference in 2004. In both papers, a MIPS architecture is used as the main processor and Blowfish as encryption algorithm. |
doi_str_mv | 10.1145/1234675.1234679 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_30983422</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>30983422</sourcerecordid><originalsourceid>FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3</originalsourceid><addsrcrecordid>eNotkE1Lw0AYhBdRsFbPXnPylna_3mwCXkrxI1CwUD2HzeZdXEmzcTcB--9tSU7PDDPMYQh5ZHTFmIQ140JmClYTiyuyYAB5ejZwfdGiSAuaq1tyF-MPpUxxCQvyvDmU-0QH8-0GNMMYMMG_vvVBD853ifUhQWudcdgNSbk_oEmwM-HUX-J7cmN1G_Fh5pJ8vb58bt_T3cdbud3sUsMgG1KecZMJaJpa2FqZHMFqBKwznbMMJbM258YCoqrBCtUIpaRVDQrJtEFeiyV5mnb74H9HjEN1dNFg2-oO_RgrQYtcSM7PxfVUNMHHGNBWfXBHHU4Vo9XlpWp-aWYh_gECJFq-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>30983422</pqid></control><display><type>article</type><title>ASIP architecture exploration for efficient IPSec encryption: A case study</title><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><creator>Scharwaechter, Hanno ; Kammler, David ; Wieferink, Andreas ; Hohenauer, Manuel ; Karuri, Kingshuk ; Ceng, Jianjiang ; Leupers, Rainer ; Ascheid, Gerd ; Meyr, Heinrich</creator><creatorcontrib>Scharwaechter, Hanno ; Kammler, David ; Wieferink, Andreas ; Hohenauer, Manuel ; Karuri, Kingshuk ; Ceng, Jianjiang ; Leupers, Rainer ; Ascheid, Gerd ; Meyr, Heinrich</creatorcontrib><description>Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven
System-on-Chip
(SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting from an initial template. To accomplish this task, design automation tools are used to detect bottlenecks in embedded applications, to implement application-specific processor instructions, and to automatically generate the required software tools (such as instruction-set simulator, C-compiler, assembler, and profiler), as well as to synthesize the hardware. This paper describes an architecture exploration loop for an ASIP coprocessor that implements common encryption functionality used in symmetric block cipher algorithms for internet protocol security (IPSec). The coprocessor is accessed via shared memory and, as a consequence, our approach is easily adaptable to arbitrary main processor architectures. This paper presents the extended version of our case study that has been already published on the SCOPES conference in 2004. In both papers, a MIPS architecture is used as the main processor and Blowfish as encryption algorithm.</description><identifier>ISSN: 1539-9087</identifier><identifier>EISSN: 1558-3465</identifier><identifier>DOI: 10.1145/1234675.1234679</identifier><language>eng</language><ispartof>ACM transactions on embedded computing systems, 2007-05, Vol.6 (2), p.12</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Scharwaechter, Hanno</creatorcontrib><creatorcontrib>Kammler, David</creatorcontrib><creatorcontrib>Wieferink, Andreas</creatorcontrib><creatorcontrib>Hohenauer, Manuel</creatorcontrib><creatorcontrib>Karuri, Kingshuk</creatorcontrib><creatorcontrib>Ceng, Jianjiang</creatorcontrib><creatorcontrib>Leupers, Rainer</creatorcontrib><creatorcontrib>Ascheid, Gerd</creatorcontrib><creatorcontrib>Meyr, Heinrich</creatorcontrib><title>ASIP architecture exploration for efficient IPSec encryption: A case study</title><title>ACM transactions on embedded computing systems</title><description>Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven
System-on-Chip
(SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting from an initial template. To accomplish this task, design automation tools are used to detect bottlenecks in embedded applications, to implement application-specific processor instructions, and to automatically generate the required software tools (such as instruction-set simulator, C-compiler, assembler, and profiler), as well as to synthesize the hardware. This paper describes an architecture exploration loop for an ASIP coprocessor that implements common encryption functionality used in symmetric block cipher algorithms for internet protocol security (IPSec). The coprocessor is accessed via shared memory and, as a consequence, our approach is easily adaptable to arbitrary main processor architectures. This paper presents the extended version of our case study that has been already published on the SCOPES conference in 2004. In both papers, a MIPS architecture is used as the main processor and Blowfish as encryption algorithm.</description><issn>1539-9087</issn><issn>1558-3465</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><recordid>eNotkE1Lw0AYhBdRsFbPXnPylna_3mwCXkrxI1CwUD2HzeZdXEmzcTcB--9tSU7PDDPMYQh5ZHTFmIQ140JmClYTiyuyYAB5ejZwfdGiSAuaq1tyF-MPpUxxCQvyvDmU-0QH8-0GNMMYMMG_vvVBD853ifUhQWudcdgNSbk_oEmwM-HUX-J7cmN1G_Fh5pJ8vb58bt_T3cdbud3sUsMgG1KecZMJaJpa2FqZHMFqBKwznbMMJbM258YCoqrBCtUIpaRVDQrJtEFeiyV5mnb74H9HjEN1dNFg2-oO_RgrQYtcSM7PxfVUNMHHGNBWfXBHHU4Vo9XlpWp-aWYh_gECJFq-</recordid><startdate>20070501</startdate><enddate>20070501</enddate><creator>Scharwaechter, Hanno</creator><creator>Kammler, David</creator><creator>Wieferink, Andreas</creator><creator>Hohenauer, Manuel</creator><creator>Karuri, Kingshuk</creator><creator>Ceng, Jianjiang</creator><creator>Leupers, Rainer</creator><creator>Ascheid, Gerd</creator><creator>Meyr, Heinrich</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20070501</creationdate><title>ASIP architecture exploration for efficient IPSec encryption</title><author>Scharwaechter, Hanno ; Kammler, David ; Wieferink, Andreas ; Hohenauer, Manuel ; Karuri, Kingshuk ; Ceng, Jianjiang ; Leupers, Rainer ; Ascheid, Gerd ; Meyr, Heinrich</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Scharwaechter, Hanno</creatorcontrib><creatorcontrib>Kammler, David</creatorcontrib><creatorcontrib>Wieferink, Andreas</creatorcontrib><creatorcontrib>Hohenauer, Manuel</creatorcontrib><creatorcontrib>Karuri, Kingshuk</creatorcontrib><creatorcontrib>Ceng, Jianjiang</creatorcontrib><creatorcontrib>Leupers, Rainer</creatorcontrib><creatorcontrib>Ascheid, Gerd</creatorcontrib><creatorcontrib>Meyr, Heinrich</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM transactions on embedded computing systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Scharwaechter, Hanno</au><au>Kammler, David</au><au>Wieferink, Andreas</au><au>Hohenauer, Manuel</au><au>Karuri, Kingshuk</au><au>Ceng, Jianjiang</au><au>Leupers, Rainer</au><au>Ascheid, Gerd</au><au>Meyr, Heinrich</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ASIP architecture exploration for efficient IPSec encryption: A case study</atitle><jtitle>ACM transactions on embedded computing systems</jtitle><date>2007-05-01</date><risdate>2007</risdate><volume>6</volume><issue>2</issue><spage>12</spage><pages>12-</pages><issn>1539-9087</issn><eissn>1558-3465</eissn><abstract>Application-Specific Instruction-Set Processors (ASIPs) are becoming increasingly popular in the world of customized, application-driven
System-on-Chip
(SoC) designs. Efficient ASIP design requires an iterative architecture exploration loop---gradual refinement of the processor architecture starting from an initial template. To accomplish this task, design automation tools are used to detect bottlenecks in embedded applications, to implement application-specific processor instructions, and to automatically generate the required software tools (such as instruction-set simulator, C-compiler, assembler, and profiler), as well as to synthesize the hardware. This paper describes an architecture exploration loop for an ASIP coprocessor that implements common encryption functionality used in symmetric block cipher algorithms for internet protocol security (IPSec). The coprocessor is accessed via shared memory and, as a consequence, our approach is easily adaptable to arbitrary main processor architectures. This paper presents the extended version of our case study that has been already published on the SCOPES conference in 2004. In both papers, a MIPS architecture is used as the main processor and Blowfish as encryption algorithm.</abstract><doi>10.1145/1234675.1234679</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1539-9087 |
ispartof | ACM transactions on embedded computing systems, 2007-05, Vol.6 (2), p.12 |
issn | 1539-9087 1558-3465 |
language | eng |
recordid | cdi_proquest_miscellaneous_30983422 |
source | Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list) |
title | ASIP architecture exploration for efficient IPSec encryption: A case study |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T18%3A31%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ASIP%20architecture%20exploration%20for%20efficient%20IPSec%20encryption:%20A%20case%20study&rft.jtitle=ACM%20transactions%20on%20embedded%20computing%20systems&rft.au=Scharwaechter,%20Hanno&rft.date=2007-05-01&rft.volume=6&rft.issue=2&rft.spage=12&rft.pages=12-&rft.issn=1539-9087&rft.eissn=1558-3465&rft_id=info:doi/10.1145/1234675.1234679&rft_dat=%3Cproquest_cross%3E30983422%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c156t-262c635ddb3fb7c8e5fae5eb6a816e41ff82cf5ee7b5f37d3774f7de341ace2b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=30983422&rft_id=info:pmid/&rfr_iscdi=true |