Browse > Article

Computation-Communication Overlapping in AES-CCM Using Thread-Level Parallelism on a Multi-Core Processor  

Lee, Eun-Ji (고려대학교 컴퓨터정보학과)
Lee, Sung-Ju (고려대학교 컴퓨터정보학과)
Chung, Yong-Wha (고려대학교 컴퓨터정보학과)
Lee, Myung-Ho (명지대학교 컴퓨터소프트웨어학과)
Min, Byoung-Ki ((주)아스텔 부설연구소)
Abstract
Multi-core processors are becoming increasingly popular. As they are widely adopted in embedded systems as well as desktop PC's, many multimedia applications are being parallelized on multi-core platforms. However, it is difficult to parallelize applications with inherent data dependencies such as encryption algorithms for multimedia data. In order to overcome this limit, we propose a technique to overlap computation and communication using an otherwise idle core in this paper. In particular, we interpret the problem of multimedia computation and communication as a pipeline design problem at the application program level, and derive an optimal number of stages in the pipeline.
Keywords
Multi-Core; Thread-Level Parallelism; Computation-Communication Overlapping;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Ishizaki, H. Komatsu, and T. Nakatani, "A Loop Transformation Algorithm for Communication Overlapping," Intl. J. of Parallel Programming, vol.28, no.2, pp.135-154, 2000.   DOI   ScienceOn
2 A. Danalis, et al., "Transformations to Parallel Codes for Communication-Computation Overlap," Proc. of SC, p.58, 2005.
3 T. Hoefler and A. Lumsdaine, "Optimizing Non- Blocking Collective Operations for Infiniband," Proc. of CAC, 2008.
4 B. Barney, POSIX Threads Programming, http:// www.llnl.gov/computing/tutorials/pthreads, 2006.
5 U. S. National Institute of Standards and Technology, "The Advanced Encryption Standard," Federal Information Processing Standard(FIPS) 197, 2002.
6 N. Dworkin, "Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality," NIST Special Publication 800-38C, 2002.
7 A. Samiah, A. Aziz, and N. Ikram, "An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless Standard," Proc. of COMPSAC, pp.689-694, 2007.
8 C. Tseng, "Compiler Optimization for Eliminating Barrier Synchronization," Proc. of PPoPP, 1995.
9 J. Lipman and Q. Stout, "A Performance Analysis of Local Synchronization," Proc. of SPAA, 2006.
10 J. Hennessy and D. Patterson, Computer Architecture: A Quantitative Approach - Fourth Edition, Elsevier, 2007.
11 E. Lee, S. Lee, S. Hong, H. Choi, W. Choi, Y. Chung, B. Min, "Parallel Processing of AES-CCM," Proc. of the CISC 2009, vol.19, no.1, pp.199-202, 2009. (in Korean)
12 D. Bae, J. Kim, S. Park, and O. Song, "Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN," Proc. of CISC 2005, LNCS 3822, pp.346-357, 2005.
13 S. Akhter and J. Roberts, Multi-Core Programming - Increasing Performance through Software Multi-Threading, Intel Press, 2006.
14 D. Stinson, Cryptography: Theory and Practice, CRC Press, 2005.
15 A. Sohn, et al., "Identifying the Capability of Overlapping Computation with Communication," Proc. of PACT, p.133, 1996.
16 J. Black, "Authenticated Encryption," 2003.