IET Computers & Digital Techniques
Volume 12, Issue 5, September 2018
Volumes & issues:
Volume 12, Issue 5
September 2018
-
- Author(s): Che Wun Chiou ; Cheng-Min Lee ; Yuh-Sien Sun ; Chiou-Yng Lee ; Jim-Min Lin
- Source: IET Computers & Digital Techniques, Volume 12, Issue 5, p. 187 –191
- DOI: 10.1049/iet-cdt.2017.0209
- Type: Article
- + Show details - Hide details
-
p.
187
–191
(5)
In this study, the authors propose a high-throughput systolic Dickson basis multiplier over GF(2 m ). Use of the Dickson basis seems promising when no Gaussian normal basis exists for the field, and it can easily carry out both squaring and multiplication operations. Many squaring operations and multiplications are needed when computing the digital signatures of elliptic curve digital signature algorithm. The proposed systolic Dickson basis multiplier can concurrently compute a great number of multiplications with a high-throughput rate, thereby substantially increasing the speed of computation for digital signatures.
- Author(s): Rourab Paul ; Gitesh Sikder ; Amlan Chakrabarti ; Ranjan Ghosh
- Source: IET Computers & Digital Techniques, Volume 12, Issue 5, p. 192 –205
- DOI: 10.1049/iet-cdt.2018.0006
- Type: Article
- + Show details - Hide details
-
p.
192
–205
(14)
Efficient and cost-effective hardware design of network security processor (NSP) is of vital importance in the present era due to the increasing need of security infrastructure in a wide range of computing applications. Here, the authors propose an NSP in field programmable gate array (FPGA) platform where according to a strict power, throughput, resource, and security priorities, a proposed preferential algorithm chooses a cipher suite to program the hardware. The choice is based on a rank list of available cipher suites depending on efficient system index evaluated in terms of power, throughput, resource, and security data and their given weights by the user. Encryption, hash, and key exchange algorithm along with their architectural variants serve excellent hardware flexibility whose bit files are stored in secure digital memory. The proposed design used an isolated key memory where secret keys are stored in encrypted form along with the hash value. The design is implemented using ISE14.4 suite with ZYNQ7z020-clg484 FPGA platform. The performances of the variants architecture of the crypto algorithms are considerably better in terms of power, throughput, and resource than the existing works reported in the literature.
- Author(s): Sunil Dutt ; Sukumar Nandi ; Gaurav Trivedi
- Source: IET Computers & Digital Techniques, Volume 12, Issue 5, p. 206 –215
- DOI: 10.1049/iet-cdt.2017.0171
- Type: Article
- + Show details - Hide details
-
p.
206
–215
(10)
Recently, several approximate adders have been proposed based on the design concept of Equal Segment Adder (ESA), i.e. to segment an N-bit adder into several smaller and independent equal size sub-adders. In this study, the authors propose analytical models to estimate Pass Rate (PR), delay, power and area of ESAs, where PR represents the probability of output to be correct. From the proposed analytical models, they observe that there is a scope and need for improvement in quality-effort curves of existing ESAs. Intended to improve the quality-effort curves, they propose modifications in existing ESAs with design objective that modified ESAs provide higher accuracy without imposing any additional delay, power and area overheads. Both the authors’ analytical and simulation results show that modified ESAs provide higher accuracy, better quality-effort curves and more optimal Delay–Power–Area–Accuracy trade-off as compared to original ESAs. In addition to accuracy enhancement, the proposed approach also provides improvements in delay and power when ESAs are used with Error Detection and Correction logic. For evaluating the effectiveness of the proposed approach in real-life applications, they process Lena image using original ESAs and modified ESAs. Their image processing results show that modified ESAs provide more precise images as compared to original ESAs.
- Author(s): Rourab Paul and Sandeep Shukla
- Source: IET Computers & Digital Techniques, Volume 12, Issue 5, p. 216 –226
- DOI: 10.1049/iet-cdt.2017.0178
- Type: Article
- + Show details - Hide details
-
p.
216
–226
(11)
Internet protocol security (IPSec), secure sockets layer (SSL)/transport layer security (TLS) and other security protocols necessitate high throughput hardware implementation of cryptographic functions. In recent literature, cryptographic functions implemented in software, application specific integrated circuit (ASIC) and field programmable gate array (FPGA). They are not necessarily optimized for throughput. Due to the various side-channel based attacks on cache and memory, and various malware based exfiltration of security keys and other sensitive information, cryptographic enclave processors are implemented which isolates the cryptographically sensitive information like keys. We propose a partitioned enclave architecture targeting IPSec, TLS and SSL where the partitioned area ensures that the processor data-path is completely isolated from the secret-key memory. The security processor consists of a Trivium random number generator, Rivest–Shamir–Adleman (RSA), advanced encryption standard (AES) and KECCAK cryptos. We implement three different optimized KECCAK architectures. The processing element (PE) handles all communication interfaces, data paths, and control hazards of network security processor. The memory of KECCAK and AES communication is done via a direct memory access controller to reduce the PE overhead. The whole system is demonstrated by FPGA implementation using Vivado 2015.2 on Artix-7 (XC7A100T, CSG324). The performances of the implemented KECCAKs are better in terms of security, throughput and resource than the existing literature.
- Author(s): Xiang Wang ; Lin Li ; Weike Wang ; Pei Du
- Source: IET Computers & Digital Techniques, Volume 12, Issue 5, p. 227 –232
- DOI: 10.1049/iet-cdt.2017.0211
- Type: Article
- + Show details - Hide details
-
p.
227
–232
(6)
A novel system power management technique is proposed that employs a novel cost function based on state-action. Compared with the conventional algorithm, by using multiple parameter constraints in cost function of power management framework, the improved Q-learning can effectively make decisions to achieve a rational optimisation room. The proposed power management framework does not need any prior data and is running on a power model. As uncertainties can be effectively captured and modelled, the framework based on the model can help to explore an ideal trade-off and converge to the best power management policy. The results obtained showed that improved algorithm achieved remarkable significance.
- Author(s): Irith Pomeranz
- Source: IET Computers & Digital Techniques, Volume 12, Issue 5, p. 233 –240
- DOI: 10.1049/iet-cdt.2017.0239
- Type: Article
- + Show details - Hide details
-
p.
233
–240
(8)
This study describes a static test compaction procedure that is applicable in the scenario where (i) a large pool of tests can be generated efficiently, but (ii) test compaction that modifies tests, and covering procedures, are not applicable, and (iii) reverse order fault simulation procedures are not sufficient for test compaction. The procedure has the ability to identify tests in the pool that are effective for test compaction even when they do not increase the fault coverage. This ability is achieved using only fault simulation with fault dropping. The procedure is designed for the case where multicycle functional broadside tests are extracted from functional test sequences. The use of multicycle tests results in higher levels of test compaction than possible with two-cycle functional broadside tests. It adds another dimension to the procedure that also needs to select a number of clock cycles for every test.
- Author(s): Youngchan Kim and Taewhan Kim
- Source: IET Computers & Digital Techniques, Volume 12, Issue 5, p. 241 –248
- DOI: 10.1049/iet-cdt.2017.0234
- Type: Article
- + Show details - Hide details
-
p.
241
–248
(8)
This study addresses the problem of developing a synthesis algorithm for clock spine networks, which is able to systematically explore the clock resources and clock variation tolerance. The idea is to transform the problem of allocating and placing clock spines on a plane into a slicing floorplan optimisation (SFO) problem, in which every candidate of clock spine network structures is uniquely expressed into a postfix notation to enable a fast cost computation in the SFO. As a result, the authors proposed synthesis algorithm can explore the diverse structures of the clock spine network to find globally optimal ones within acceptable run time. Through experiments with benchmark circuits, it is shown that the proposed algorithm is able to synthesise the clock spine networks with 38% reduced clock skew over the clock tree structures, even 11% reduced clock power. In addition, in comparison with the clock mesh structures, the proposed clock spine networks have comparable tolerance to clock skew variation while using considerably less clock resources, reducing clock power by 36%.
High-throughput Dickson basis multiplier with a trinomial for lightweight cryptosystems
Hardware variant NSP with security-aware automated preferential algorithm
Accuracy enhancement of equal segment based approximate adders
Partitioned security processor architecture on FPGA platform
Online learning based on a novel cost function for system power management
Static test compaction procedure for large pools of multicycle functional broadside tests
Synthesis and exploration of clock spines
Most viewed content
Most cited content for this Journal
-
High-performance elliptic curve cryptography processor over NIST prime fields
- Author(s): Md Selim Hossain ; Yinan Kong ; Ehsan Saeedi ; Niras C. Vayalil
- Type: Article
-
Majority-based evolution state assignment algorithm for area and power optimisation of sequential circuits
- Author(s): Aiman H. El-Maleh
- Type: Article
-
Scalable GF(p) Montgomery multiplier based on a digit–digit computation approach
- Author(s): M. Morales-Sandoval and A. Diaz-Perez
- Type: Article
-
Fabrication and characterisation of Al gate n-metal–oxide–semiconductor field-effect transistor, on-chip fabricated with silicon nitride ion-sensitive field-effect transistor
- Author(s): Rekha Chaudhary ; Amit Sharma ; Soumendu Sinha ; Jyoti Yadav ; Rishi Sharma ; Ravindra Mukhiya ; Vinod K. Khanna
- Type: Article
-
Adaptively weighted round-robin arbitration for equality of service in a many-core network-on-chip
- Author(s): Hanmin Park and Kiyoung Choi
- Type: Article