A Genetic Programming approach for hardware-oriented hash functions for network security applications

被引:0
|
作者
Hassan, Mujtaba [1 ]
Sateesan, Arish [1 ]
Vliegen, Jo [1 ]
Picek, Stjepan [2 ]
Mentens, Nele [1 ,3 ]
机构
[1] Katholieke Univ Leuven, ES&S, COSIC, ESAT, Diepenbeek, Belgium
[2] Radboud Univ Nijmegen, Digital Secur Grp, Nijmegen, Netherlands
[3] Leiden Univ, LIACS, Leiden, Netherlands
关键词
Hash functions; Genetic Programming; Field Programmable Gate Arrays; Bloom filters; Evolutionary computation; BLOOM FILTERS; DESIGN;
D O I
10.1016/j.asoc.2024.112078
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Non-cryptographic (NC) hash functions are generally designed for speed and efficiency, which enables their use in many network security applications that require efficient lookup and counting, such as Bloom Filters and Count-Min (CM) Sketch structures. The performance of these structures heavily relies on underlying hash functions. Therefore, any advancement in the hash function design significantly impacts the overall performance of these structures. This paper presents a novel family of 32-bit NC hash functions (NCGPH-32) evolved using Genetic Programming (GP) and their corresponding implementation on Field Programmable Gate Arrays (FPGAs). This family of NC hash functions generates smaller hash values concatenated to produce larger hash outputs. Inspired by related work on 96-bit NC hash functions with GP, this work optimizes the performance of 32-bit NC hash functions on FPGA while achieving high scores on specific avalanche metrics (avalanche dependence, avalanche weight, and entropy) when considering concatenated 96-bit outputs. This optimization is of utmost importance to address the escalating demand for Terabit Ethernet networks, specifically in processing real-time network flow IDs (identification and monitoring) at line rate. The throughput, latency, operating frequency, and resource utilization are evaluated on an FPGA and compared against 17 state-of-the-art NC hash functions. The results show that the proposed 96-bit concatenated hash function surpasses prior GP-based and other state-of-the-art NC hash functions by at least 36% in operating frequency, 30% in throughput and reduces latency by 27%. The demonstrated improvements in the hash design not only cater to the present demands of Terabit networks but also meet the expected near-future demands. Additionally, we integrate these hash functions into the Standard Bloom Filter (SBF) architecture and demonstrate comparable false positive rates (FPR) to state-of-the-art NC hash functions, affirming their effectiveness and applicability. We have also conducted several statistical tests on hash outputs of NCGPH-32 to demonstrate the high random nature and uniform distribution.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A Genetic Programming Approach to Network Management Regulation
    DeMaagd, Kurt
    Bauer, Johannes
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 807 - 816
  • [42] A digital signature algorithm in information and network security based on discrete logarithm and hash functions
    Qu, Peixin
    Liu, Zhen
    Journal of Convergence Information Technology, 2012, 7 (20) : 557 - 564
  • [43] A Data Parallel Approach to Genetic Programming Using Programmable Graphics Hardware
    Chitty, Darren M.
    GECCO 2007: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2007, : 1566 - 1573
  • [44] Evolutionary Design of Fast High-quality Hash Functions for Network Applications
    Grochol, David
    Sekanina, Lukas
    GECCO'16: PROCEEDINGS OF THE 2016 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2016, : 901 - 908
  • [45] LINEAR-PROGRAMMING FOR POWER SYSTEM NETWORK SECURITY APPLICATIONS
    STOTT, B
    MARINHO, JL
    IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1979, 98 (03): : 837 - 848
  • [46] Enif-Lang: A Specialized Language for Programming Network Functions on Commodity Hardware
    Bonelli, Nicola
    Giordano, Stefano
    Procissi, Gregorio
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2018, 7 (03):
  • [47] An approach to brain-image oriented programming for Web applications
    Shimomura, T
    Takahashi, M
    Ikeda, K
    Mogami, Y
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2003, : 436 - 441
  • [48] ASIC-Oriented Comparative Review of Hardware Security Algorithms for Internet of Things Applications
    Bahnasawi, Mohamed A.
    Ibrahim, Khalid
    Mohamed, Ahmed
    Mohamed, Mohamed Khalifa
    Moustafa, Ahmed
    Abdelmonem, Kareem
    Ismail, Yehea
    Mostafa, Hassan
    2016 28TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM 2016), 2016, : 285 - 288
  • [49] Assessing Consumer Credit Applications by a Genetic Programming Approach
    Rampone, Salvatore
    Frattolillo, Franco
    Landolfi, Federica
    ADVANCED DYNAMIC MODELING OF ECONOMIC AND SOCIAL SYSTEMS, 2013, 448 : 79 - +
  • [50] Improved approach of Genetic Programming and applications for data mining
    Zhang, Yongqiang
    Chen, Huashan
    ADVANCES IN NATURAL COMPUTATION, PT 1, 2006, 4221 : 816 - 819