Hardware-based hash functions for network applications

Fumito Yamaguchi, Hiroaki Nishi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

Abstract

For rich network services, it is indispensable to reconstruct TCP stream in the middle of the network. In this reconstruction function, managing a large number of streams is a crucial as an embedded hardware for achieving high-throughput processing. In this case, hashing is a well-used solution as an ID key of TCP streams. Since CRC hashes have simple tree structure of XOR logics and are perfectly composed of combination logics, they can easily be hardware implemented and enables low-latency calculation of the hash values. Therefore, CRC hash has been used in network applications where low-latency and high speed operations are necessary. Some of their usages include data identification, load balancing, encryption, and checksum. Although CRC hashes may be well suited for hardware implementation, it is not the top choice when collision rates and distribution of hash values are considered. For some network workloads, CRC hashing shows very uneven distribution of hash values and can lead to decrease in the overall performance of network systems. In this study, two hashes, Jenkins hash and MurmurHash, are implemented on a FPGA as TCP connection manager and evaluated for their aptitude for hashing used in hardware-based network applications.

Original languageEnglish
Title of host publicationIEEE International Conference on Networks, ICON
PublisherIEEE Computer Society
ISBN (Print)9781479920846
DOIs
Publication statusPublished - 2013
Event2013 19th IEEE International Conference on Networks, ICON 2013 - Singapore, Singapore
Duration: 2013 Dec 112013 Dec 13

Other

Other2013 19th IEEE International Conference on Networks, ICON 2013
CountrySingapore
CitySingapore
Period13/12/1113/12/13

Fingerprint

Hash functions
Hardware
Resource allocation
Cryptography
Field programmable gate arrays (FPGA)
Managers
Throughput
Processing

Keywords

  • FPGA
  • Hardware Implementation
  • Hashing
  • TCP Connection Manager

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering
  • Safety, Risk, Reliability and Quality

Cite this

Yamaguchi, F., & Nishi, H. (2013). Hardware-based hash functions for network applications. In IEEE International Conference on Networks, ICON [6781990] IEEE Computer Society. https://doi.org/10.1109/ICON.2013.6781990

Hardware-based hash functions for network applications. / Yamaguchi, Fumito; Nishi, Hiroaki.

IEEE International Conference on Networks, ICON. IEEE Computer Society, 2013. 6781990.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yamaguchi, F & Nishi, H 2013, Hardware-based hash functions for network applications. in IEEE International Conference on Networks, ICON., 6781990, IEEE Computer Society, 2013 19th IEEE International Conference on Networks, ICON 2013, Singapore, Singapore, 13/12/11. https://doi.org/10.1109/ICON.2013.6781990
Yamaguchi F, Nishi H. Hardware-based hash functions for network applications. In IEEE International Conference on Networks, ICON. IEEE Computer Society. 2013. 6781990 https://doi.org/10.1109/ICON.2013.6781990
Yamaguchi, Fumito ; Nishi, Hiroaki. / Hardware-based hash functions for network applications. IEEE International Conference on Networks, ICON. IEEE Computer Society, 2013.
@inproceedings{78d102b91f9243178ab85e364fe63941,
title = "Hardware-based hash functions for network applications",
abstract = "For rich network services, it is indispensable to reconstruct TCP stream in the middle of the network. In this reconstruction function, managing a large number of streams is a crucial as an embedded hardware for achieving high-throughput processing. In this case, hashing is a well-used solution as an ID key of TCP streams. Since CRC hashes have simple tree structure of XOR logics and are perfectly composed of combination logics, they can easily be hardware implemented and enables low-latency calculation of the hash values. Therefore, CRC hash has been used in network applications where low-latency and high speed operations are necessary. Some of their usages include data identification, load balancing, encryption, and checksum. Although CRC hashes may be well suited for hardware implementation, it is not the top choice when collision rates and distribution of hash values are considered. For some network workloads, CRC hashing shows very uneven distribution of hash values and can lead to decrease in the overall performance of network systems. In this study, two hashes, Jenkins hash and MurmurHash, are implemented on a FPGA as TCP connection manager and evaluated for their aptitude for hashing used in hardware-based network applications.",
keywords = "FPGA, Hardware Implementation, Hashing, TCP Connection Manager",
author = "Fumito Yamaguchi and Hiroaki Nishi",
year = "2013",
doi = "10.1109/ICON.2013.6781990",
language = "English",
isbn = "9781479920846",
booktitle = "IEEE International Conference on Networks, ICON",
publisher = "IEEE Computer Society",

}

TY - GEN

T1 - Hardware-based hash functions for network applications

AU - Yamaguchi, Fumito

AU - Nishi, Hiroaki

PY - 2013

Y1 - 2013

N2 - For rich network services, it is indispensable to reconstruct TCP stream in the middle of the network. In this reconstruction function, managing a large number of streams is a crucial as an embedded hardware for achieving high-throughput processing. In this case, hashing is a well-used solution as an ID key of TCP streams. Since CRC hashes have simple tree structure of XOR logics and are perfectly composed of combination logics, they can easily be hardware implemented and enables low-latency calculation of the hash values. Therefore, CRC hash has been used in network applications where low-latency and high speed operations are necessary. Some of their usages include data identification, load balancing, encryption, and checksum. Although CRC hashes may be well suited for hardware implementation, it is not the top choice when collision rates and distribution of hash values are considered. For some network workloads, CRC hashing shows very uneven distribution of hash values and can lead to decrease in the overall performance of network systems. In this study, two hashes, Jenkins hash and MurmurHash, are implemented on a FPGA as TCP connection manager and evaluated for their aptitude for hashing used in hardware-based network applications.

AB - For rich network services, it is indispensable to reconstruct TCP stream in the middle of the network. In this reconstruction function, managing a large number of streams is a crucial as an embedded hardware for achieving high-throughput processing. In this case, hashing is a well-used solution as an ID key of TCP streams. Since CRC hashes have simple tree structure of XOR logics and are perfectly composed of combination logics, they can easily be hardware implemented and enables low-latency calculation of the hash values. Therefore, CRC hash has been used in network applications where low-latency and high speed operations are necessary. Some of their usages include data identification, load balancing, encryption, and checksum. Although CRC hashes may be well suited for hardware implementation, it is not the top choice when collision rates and distribution of hash values are considered. For some network workloads, CRC hashing shows very uneven distribution of hash values and can lead to decrease in the overall performance of network systems. In this study, two hashes, Jenkins hash and MurmurHash, are implemented on a FPGA as TCP connection manager and evaluated for their aptitude for hashing used in hardware-based network applications.

KW - FPGA

KW - Hardware Implementation

KW - Hashing

KW - TCP Connection Manager

UR - http://www.scopus.com/inward/record.url?scp=84899416208&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84899416208&partnerID=8YFLogxK

U2 - 10.1109/ICON.2013.6781990

DO - 10.1109/ICON.2013.6781990

M3 - Conference contribution

AN - SCOPUS:84899416208

SN - 9781479920846

BT - IEEE International Conference on Networks, ICON

PB - IEEE Computer Society

ER -