ABSTRACT
We present an architecture level low power design technique called divide-and-concatenate for universal hash functions based on the following observations: (i) the power consumption of a w-bit array multiplier and associated universal hash data path decreases as O(w4) if its clock rate remains constant. (ii) two universal hash functions are equivalent if they have the same collision probability property. In the proposed approach we divide a w-bit data path (with collision probability 2-w) into two/four w/2-bit data paths (each with collision probability 2-w/2) and concatenate their results to construct an equivalent w-bit data path (with a collision probability 2-w). A popular low power technique that uses parallel data paths saves 62.10% dynamic power consumption incurring 102% area overhead. In contrast, the divide-and-concatenate technique saves 55.44% dynamic power consumption with only 16% area overhead.
- S. Halevi and H. Krawczyk. Mmh: Software message authentication in the gbit/second rates. In Workshop on Fast Software Encryption, pages 172--189, 1997.]] Google ScholarDigital Library
- J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. Umac: Fast and secure message authentication. In Cryptology Conference on Advances in Cryptology, pages 216--233, 1999.]] Google ScholarDigital Library
- D. A. McGrew. The truncated multi-modular hash function TMMH. In IETF Internet Draft, 2001.]]Google Scholar
- S.Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood. Deep packet inspection using parallel bloom filters. In High Performance Interconnects, pages 614--617, 2003.]]Google ScholarCross Ref
- Z. Huang. High-Level Optimization Techniques for Low-Power Multiplier Design. Ph.D. Thesis, University of California at Los Angeles, 2003.]] Google ScholarDigital Library
- A. Raghunathan, S. Dey, and N. K. Jha. Glitch analysis and reduction in register transfer level power optimization. In Design Automation Conference, pages 331--336, 1996.]] Google ScholarDigital Library
- J. Yu, W. Wu, X. Chen, H. Hsieh, J. Yang, and F. Balarin. Assertion-based design exploration of dvs in network processor architectures. In Design Automation and Test in Europe, pages 92--97, 2005.]] Google ScholarDigital Library
- P. Petrov and A. Orailoglu. Low-power instruction bus encoding for embedded processors. IEEE Trans. Very Large Scale Integr. Syst., 12(8):812--826, 2004.]] Google ScholarDigital Library
- M. Srivastava and M. Potkonjak. Power optimization in programmable processors and asic implementations of linear systems: Transformation-based approach. In Design Automation Conference, pages 343--348, 1996.]] Google ScholarDigital Library
- A. Chandrakasan, S. Sheng, and R. Brodersen. Low-power cmos digital design. IEEE Journal of Solid-State Circuits, 27(4):473--484, 1992.]]Google ScholarCross Ref
- J. M. Rabaey. Digital Integrated Circuits: A Design Perspective. Prentice-Hall, Englewood Cliffs, NJ, 1996.]] Google ScholarDigital Library
- B. Yang, R. Karri, and D. A. Mcgrew. Divide-and-concatenate: An architecture level optimization technique for universal hash functions. In Design Automation Conference, pages 44--52, 2004.]] Google ScholarDigital Library
- P. Rogaway and T. Shrimpton. Cryptographic hash function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Fast Software Encryption, pages 371--388, 2004.]]Google ScholarCross Ref
- L. Carter and M. Wegman. Universal hash functions. Journal of Computer and System Sciences, 18:143--154, 1979.]]Google ScholarCross Ref
- I. Koren. Computer Arithmetic Algorithms. A. K. Peters, Natick, Massachusetts, 2nd Edition, 2002.]] Google ScholarDigital Library
- J. R. Black. Message Authentication Codes. Ph.D. Thesis, University of California at Davis, 2000.]] Google ScholarDigital Library
Index Terms
- Power optimization for universal hash function data path using divide-and-concatenate technique
Recommendations
Power Optimization for Universal Hash Function Data Path Using Divide-and-Concatenate Technique
We present an architecture level low-power design technique called divide and concatenate for universal hash functions based on the following observations. (1) The power consumption of a w-bit array multiplier and associated universal hash data path ...
Divide-and-concatenate: an architecture-level optimization technique for universal hash functions
The authors present an architectural optimization technique called divide-and-concatenate for hardware architectures of universal hash functions based on three observations: 1) the area of a multiplier and associated data path decreases quadratically ...
On gate level power optimization using dual-supply voltages
In this paper, we present an approach for applying two supply voltges to optimize power in CMOS digital circuits under the timing constraints. Given a technology-mapped network, we first analyze the power/delay model and the timing slack distribution in ...
Comments