Microarchitecture Design and Benchmarking of Custom SHA-3 Instruction for RISC-V
By: Alperen Bolat , Sakir Sezer , Kieran McLaughlin and more
Potential Business Impact:
Makes computers faster at scrambling secret messages.
Integrating cryptographic accelerators into modern CPU architectures presents unique microarchitectural challenges, particularly when extending instruction sets with complex and multistage operations. Hardware-assisted cryptographic instructions, such as Intel's AES-NI and ARM's custom instructions for encryption workloads, have demonstrated substantial performance improvements. However, efficient SHA-3 acceleration remains an open problem due to its distinct permutation-based structure and memory access patterns. Existing solutions primarily rely on standalone coprocessors or software optimizations, often avoiding the complexities of direct microarchitectural integration. This study investigates the architectural challenges of embedding a SHA-3 permutation operation as a custom instruction within a general-purpose processor, focusing on pipelined simultaneous execution, storage utilization, and hardware cost. In this paper, we investigated and prototyped a SHA-3 custom instruction for the RISC-V CPU architecture. Using cycle-accurate GEM5 simulations and FPGA prototyping, our results demonstrate performance improvements of up to 8.02x for RISC-V optimized SHA-3 software workloads and up to 46.31x for Keccak-specific software workloads, with only a 15.09% increase in registers and a 11.51% increase in LUT utilization. These findings provide critical insights into the feasibility and impact of SHA-3 acceleration at the microarchitectural level, highlighting practical design considerations for future cryptographic instruction set extensions.
Similar Papers
Design and Implementation of a RISC-V SoC with Custom DSP Accelerators for Edge Computing
Hardware Architecture
Makes computer chips use less power.
Lightweight Unified Sha-3/Shake Architecture with a Fault-Resilient State
Hardware Architecture
Makes secret codes safer from computer attacks.
AES-RV: Hardware-Efficient RISC-V Accelerator with Low-Latency AES Instruction Extension for IoT Security
Hardware Architecture
Makes secret codes faster and uses less power.