DocumentCode
264308
Title
Design methodologies impact on the embedded system performances: Case of cryptographic algorithm
Author
Mhadhbi, Imene ; Rejeb, Nejla ; Ben Othman, Sarah ; Litayem, Nabil ; Ben Saoud, Slim
Author_Institution
LSA Lab., Univ. of Carthage, La Marsa, Tunisia
fYear
2014
fDate
18-20 Jan. 2014
Firstpage
1
Lastpage
6
Abstract
Due to their flexible architecture, lower-cost and faster processing, Field Programmable Gate Arrays (FPGAs) provide the ability to implement a Programmable System-On-Chip (SoPC) on a single FPGA which include one or more hard-core or soft-core microprocessors. The programmable logic fabric of the FPGA can be used to implement complex embedded applications using three design methodologies. The first is based on software implementation using soft-core microprocessors that give designers the ability to adapt many configured elements to their specific application including memory subsystems, interrupt handling, ISA features, etc. The second is based on hardware implementation using traditional CAD tools. And the third is based on both software/hardware co-design methodology using coprocessors in order to accelerate the design process. This paper proposes a performance evaluation of these design methodologies on a complex secure application such as lightweight cryptographic hash functions. According to their high computationally intensive in FPGA-Based systems and their growing demand in different applications such as networks authentications, SCADA (Supervision Control and Data Acquisition) systems, Digital Signal Standard (DSS), lightweight cryptographic hash functions present the most appropriate choice to evaluate our design methodologies.
Keywords
CAD; cryptography; embedded systems; field programmable gate arrays; microprocessor chips; system-on-chip; CAD tools; FPGA; SoPC; cryptographic algorithm; design methodologies; embedded system; field programmable gate arrays; flexible architecture; microprocessors; programmable logic fabric; programmable system-on-chip; software implementation; Algorithm design and analysis; Benchmark testing; Cryptography; Hardware; Software; Table lookup; Unified modeling language; FPGA; lightweight cryptographic hash functions; performance evaluation;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Applications & Research (WSCAR), 2014 World Symposium on
Conference_Location
Sousse
Print_ISBN
978-1-4799-2805-7
Type
conf
DOI
10.1109/WSCAR.2014.6916825
Filename
6916825
Link To Document