期刊文献+

面向众核密码处理器的高效负载均衡技术 被引量:3

Efficient Workload Balance Technology on Many-core Crypto Processor
下载PDF
导出
摘要 工作负载分配不均是制约众核密码平台资源利用率提高的重要因素,动态负载分配可提高平台资源利用率,但具有一定开销;所以更高的负载均衡频率并不一定带来更高的负载均衡增益。因此,该文建立了关于负载均衡增益率与负载均衡频率的数学模型。基于模型,提出一种面向众核密码平台的无冲突负载均衡策略和一种基于硬件作业队列的"可扩展-可移植"负载均衡引擎——"簇间微网络-簇内环阵列"。实验证明:在性能、延时功耗积、资源利用率和负载均衡度方面,该文设计的负载均衡引擎与基于"作业窃取"的软件技术相比平均优化约4.06倍、7.17倍、23.01%和2.15倍;与基于"作业窃取"的硬件技术相比约优化1.75倍、2.45倍、10.2%、和1.41倍;与理想硬件技术相比,密码算法吞吐率平均只降低了约5.67%(最低3%)。实验结果表明该文技术具有良好的可扩展性和可移植性。 Imbalanced workload distribution results in low resource utilization of many-core crypto-platform.Dynamic workload allocation can improve the resource utilization with some overhead.Therefore,a higher frequency of workload balancing is not equivalent to higher gains.This paper establishes a mathematical model for gain rate and frequency of workload balancing.Based on this model,a collision-free workload balancing policy is proposed for many-core crypto systems,and a hierarchical"expandable-portable"engine is put forward,which consists of"Inter-cluster micro-network and intra-cluster ring-array"adopting hardware job queue technology.Experiment results show that the proposed workload-balancing engine is 4.06,7.17,23.01%and 2.15 times higher than the software technology based on“job stealing”in terms of performance,delay power consumption,resource utilization and workload balance;1.75,2.45,10.2%,and 1.41 times better compared with the hardware technology based on"job stealing".By contrast with the ideal hardware technology,the average throughput of encryption algorithms is only decreased by 5.67%(the lowest 3%).The experiment also proves the scalability and portability of the proposed technique.
作者 戴紫彬 尹安琪 曲彤洲 南龙梅 DAI Zibin;YIN Anqi;QU Tongzhou;NAN Longmei(The PLA Information Engineering University,Zhengzhou 450001,China;State Key Laboratory of ASIC and System,Fudan University,Shanghai 201203,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2019年第2期369-376,共8页 Journal of Electronics & Information Technology
关键词 众核密码处理器 负载均衡策略 负载均衡引擎 无冲突 Many-core crypto processor Workload balance strategy Workload balance engine Collision-free
  • 相关文献

参考文献2

二级参考文献10

  • 1McEvoy, R.P., Crowe, F.M., Murphy, C.C., Marnane, W.P.: Optimisation of the SHA-2 family of hash functions on FPGAs. IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI' 06) (2006) 317-322.
  • 2Jean-Philippe Aumasson, Luca Henzen, Willi Meier, Raphael C.-W. Phan. SHA-3 proposal BLAKE.
  • 3C. Ko C and C. Hung, "Carry-save adders for computing the product AB modulo N," Electronics Letters, vol. 26, no. 13, pp. 899-900, 1990.
  • 4Kimmo Jarvinen, "Design and implementation of a SHA-1 hash module on FPGAs, " tech. rep., Helsinki University of Technology, Signal Processing Laboratory, November 2004.
  • 5B. Baldwin, N. Hanley, M. Hamilton, L. Lu, A. Byrne, M. ONeill, and W. Mamane, "FPGA Implementations of the Round Two SHA-3 Candidates," Structure,vol. 224, p. 256.
  • 6L. Henzen, J. Aumasson, W. Meier, and C. Raphael, "VLSI Characterization of the Cryptographic Hash Function BLAKE," 2010.
  • 7朱敏,刘雷波,尹首一,陈英杰,魏少军.面向对称密码领域的可重构阵列设计[J].微电子学,2012,42(6):815-818. 被引量:5
  • 8魏少军,刘雷波,尹首一.可重构计算处理器技术[J].中国科学:信息科学,2012,42(12):1559-1576. 被引量:22
  • 9杨子煜,严明,王大伟,李思昆.面向CGRA循环流水映射的数据并行优化[J].计算机学报,2013,36(6):1280-1289. 被引量:5
  • 10LI Wei,ZENG Xiaoyang,NAN Longmei,CHEN Tao,DAI Zibin.A Reconfigurable Block Cryptographic Processor Based on VLIW Architecture[J].China Communications,2016,13(1):91-99. 被引量:11

共引文献19

同被引文献17

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部