Professional Documents
Culture Documents
AbstractThis paper investigates the effects of different design when estimating the overall power consumption of the device.
tool (Xilinx ISE) optimisation schemes on FPGA power con- At the same time, it investigates the existence of a specific
sumption. Specifically, on-the-bench measurements are presented optimisation scheme that leads to the minimisation of power
for eight highly popular security algorithms, which have been
tested under a number of different synthesis and implementation dissipation.
optimisation scenarios. The algorithms under investigation are In order to perform this analysis, a number of encryption
the BasicRSA, BasicDES, Camellia (with two distinct variations), and authentication algorithms have been selected. These are
TripleDES, AES, DES, and MD5. Finally, the efficiency of the the basic RSA, basic DES, Camellia, 3DES, AES, DES and
design tool in generating accurate predictions on the power
consumption of a specific design is also addressed. MD5. What they all have in common is the need for high
Results show that power consumption figures may vary from processing power and this can be a serious problem if their
a 306mW reduction (compared to nominal design effort) to a FPGA implementation is to be commercialised both in terms
33mW increase and average improvement on the power consump- of energy efficiency and vulnerability to security information
tion measured values ranges between 9.21% and -0.94% when attacks, [1] and [2].
different optimisation schemes are utilised. The Xilinx XPower
Analyzer is also scrutinised; It provides estimates that are well Although different to this paper in terms of focus,
above what is actually measured and the estimation error ranges power measurements when implementing particular de-
between 17.5% to more than 200%. In the worst case, the XPower signs/algorithms in FPGAs have been presented in [3] (matrix
estimate is 307mW greater than the least power consumption multiplication algorithms) and [4] (selected digital signal pro-
value measured on-the-bench whereas it remains 258mW higher
than the average value measured for the same algorithm and
cessing modules). In addition, it is worth mentioning similar
under all different optimisation scenarios. The least deviation work on the topic of creating power efficient FPGAs [5], where
in results is measured between 23mW and 31mW, however, the physical on-board measurements are used to extract accurate
XPower estimate remains greater than that measured on-the- power consumption prediction models for any given design.
bench. This is typical of the research activity invested in FPGA
Index TermsAES, DES, 3DES, Basic DES, RSA, Camellia,
MD5, Xilinx, FPGA, Power Estimation
power consumption whereby one of the main objectives is
to develop an accurate power estimation technique or method-
I. INTRODUCTION ology that guarantees the desired performance and delivers
power efficient systems. Two distinct ways for achieving this
Contemporary FPGAs exhibit many millions of transistors have been identified and they consist of i) extracting the
and this pushes the static power consumption of the chip to optimum way for design placement within the FPGA and
unacceptable levels. In addition, the post-fabrication flexibility ii) calculating the effect of load capacitances that emerge
provided by these devices is implemented using a large number due to interconnections and CMOS gates, both of which are
of pre-fabricated routing tracks and programmable switches, presented in [6], [7], [8], [9], and [10]. Furthermore, a slightly
which consume a significant amount of power every time different insight to FPGA power consumption is demonstrated
they switch. In addition, the programmable switches add in [11] where the most economical type of FPGA routing
capacitance to each track, which further increases the power architecture is looked into, i.e. bidirectional or unidirectional.
dissipation of the FPGA. Finally, the work presented in this paper has evolved through
This paper demonstrates, for the first time, the effects that previous efforts that have been documented in [12] and [13].
different design tool optimisation schemes have on FPGA The former gives a comparative analysis between actual and
power consumption as well as the accuracy of those tools theoretically calculated power consumption figures extracted
978-1-4577-1740-6/11/$26.00
c 2011 IEEE from implementing two security algorithms in Xilinx and
Altera FPGAs. The latter investigates the potential power
consumption benefits that may rise by introducing special
purpose hardware (instead of software) implementations of
CPU intensive tasks, such as, security applications to wireless
networks.
II. SECURITY ALGORITHMS
The security algorithms selected are widely used in data
encryption/decryption and authentication:
1) In cryptography, the Advanced Encryption Standard
(AES) [14] is a block cipher. It was announced by the National
Institute of Standards and Technology (NIST) after a 5-year
standardization process and it has now become highly popular.
2) The Data Encryption Standard (DES) [15] is a cipher
selected as an official Federal Information Processing Standard
(FIPS) for the United States since 1976, and has subsequently
enjoyed widespread use internationally. Fig. 1. Xilinx Digilent XUP Board
3) Triple DES (3DES) is a block cipher formed from the
Data Encryption Standard (DES) cipher by using the same
algorithm three times but each time with a different key. Rs
Iload
4) Basic DES is essentially a smaller and faster im- Vsense
plementation of the DES algorithm. It executes DES type
encryption/decryption in ECB (Electronic Codebook) mode S+ S- VCCINT
and is able to accept a new key for each operation without Vsupply ZXCT1021 FPGA
GND OUT
performance cost. GND
set-up optimisation goal optimisation effort map effort level place and route mode power reduction
(speed/area) (normal/high) (standard/high) (normal/multi) (on/off)
A speed high standard normal off
B area high standard normal off
C speed high high normal off
D area high high normal off
E speed high standard multi off
F area high standard multi off
G speed high high multi off
H area high high multi off
I speed high standard normal on
J area high standard normal on
K speed high high normal on
L area high high normal on
M speed high standard multi on
N area high standard multi on
O speed high high multi on
P area high high multi on
300
is the default and that is why the algorithms with minimum 200
50
A B C D E F G H I J K L M N O P
6.00% 350
300
250
2.00%
200
0.00%
150
-2.00% 100
A B C D E F G H I J K L M N O P
50
Setup
Basic RSA Basic DES Cammelia1 Cammelia2 3DES AES DES MD5
Fig. 4. Percentage of difference from default for each set-up Security Algorithm
b)
%error between Xpower and Meas.Av. %error between Xpower and Least Meas.
separately, set-up P gave the best results in five out of eight 200
cases making it the most efficient. In contrast, the worst overall 175
150
% Difference
performance is yielded by set-up E which measures a negative 125
deviation from the default and this signifies an overall power 100
75
consumption. 25
Basic RSA Basic DES Cammelia1 Cammelia2 3DES AES DES MD5
against the measured data. Interestingly enough, the tool Security Algorithm