Skip to main navigation Skip to search Skip to main content

Fine-grained analysis and design of ASIP instruction set for application of encryption

  • Jinbin Ju*
  • , Quan Jinguo
  • , Qian Chen
  • , Yan Zhang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Focusing on the defects of application-specific integrated processor (ASIP) design for encryption including complexity, long-term of development and lack of compatibility, in this paper we present an ASIP design method based on reconfigurable embedded RISC processor core, taking advantage of novel fine-grained code analysis technology. This relatively concise design process includes taking fine-grained analysis of target encryption code, extending instructions of the critical parts, and coupling the extended instructions as a co-processor in hardware structure with a general main-processor. As an instance, we take secure hash algorithm (SHA) as the target code, design and implement an ASIP in this process. The hardware verification and implementation result signifies that the designed processor has, at expense of relatively small chip area consumed, achieved obvious increase of performance for encryption.

Original languageEnglish
Title of host publicationProceedings of the 2011 ACM Research in Applied Computation Symposium, RACS 2011
Pages44-49
Number of pages6
DOIs
StatePublished - 2011
Externally publishedYes
Event2011 ACM Research in Applied Computation Symposium, RACS 2011 - Miami, FL, United States
Duration: 2 Nov 20115 Nov 2011

Publication series

NameProceedings of the 2011 ACM Research in Applied Computation Symposium, RACS 2011

Conference

Conference2011 ACM Research in Applied Computation Symposium, RACS 2011
Country/TerritoryUnited States
CityMiami, FL
Period2/11/115/11/11

Keywords

  • ASIP
  • co-processor
  • encryption
  • fine-grained analysis
  • instruction extension

Fingerprint

Dive into the research topics of 'Fine-grained analysis and design of ASIP instruction set for application of encryption'. Together they form a unique fingerprint.

Cite this