The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Fast Cryptographic Computation Via Function Stitching
Executive summaryCryptographic applications often run more than one independent algorithm such as encryption and authentication. This fact provides a high level of parallelism which can be exploited by software and converted into instruction level parallelism to improve overall performance on modern super-scalar processors. We present fast and efficient methods of computing such pairs of functions on IA processors using a method called “function stitching”. Instead of computing pairs of functions sequentially as is done today in applications/libraries, we replace the function calls by a single call to a composite function that implements both algorithms. The execution time of this composite function can be made significantly shorter than the sums of the execution times for the individual functions and, in many cases, close to the execution time of the slower function.Function stitching is best done at a very fine grain, interleaving the code for the individual algorithms at an instruction-level granularity. This results in excellent utilization of the execution resources in the processor core with a single thread.We show how stitching pairs of functions together in a fine-grained manner results in excellent performance on IA processors. Currently, applications perform the functions sequentially. We demonstrate performance gains of 1.4X-1.9X with stitching over the best sequential function performance.Read the full Fast Cryptographic Computation Via Function Stitching white paper: http://www.intel.com/content/www/us/en/communications/communications-ia-cryptographic-paper.html
See how tomorrow’s network will deliver individual solutions to enhance experience and value.
Illustrates Yanzi Networks* real-time machine-to-machine communication solution.
RSA 2012 Intel keynote speech provides architectural insights to tomorrow’s security infrastructure.
Security software extracts metadata, classifies flows, and displays data in a compact format.
Describes how Crystal Forest can accelerate Wire-Speed Next Generation Firewall* performance.
Intel CTO Pranav Mehta explains dynamically combining compute and network services.