Architectural Techniques for Accelerating Subword Permutations with Repetitions John P

Total Page:16

File Type:pdf, Size:1020Kb

Architectural Techniques for Accelerating Subword Permutations with Repetitions John P IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 11, NO. 3, JUNE 2003 325 Architectural Techniques for Accelerating Subword Permutations With Repetitions John P. McGregor and Ruby B. Lee, Fellow, IEEE Abstract—We propose two new instructions, swperm and use permutations to achieve diffusion [21], a critical character- sieve, that can be used to efficiently complete an arbitrary istic of a secure cipher, in symmetric-key encryption algorithms bit-level permutation of an -bit word with or without repetitions. such as DES [14], Twofish [19], and Serpent [2]. Some permu- Permutations with repetitions are rearrangements of an ordered set in which elements may replace other elements in the set; tations in cryptographic algorithms are not bijections. For in- such permutations are useful in cryptographic algorithms. On a stance, the expansion permutation in DES maps some bits in four-way superscalar processor, we can complete an arbitrary the source datum to multiple destinations in the result datum. 64-bit permutation with repetitions of 1-bit subwords in 11 We define such rearrangements of an ordered set in which el- instructions and only four cycles using the two proposed instruc- ements can be replicated and possibly replace other elements tions. For subwords of size 4 bits or greater, we can perform an arbitrary permutation with repetitions of a 64-bit register in a in the set to be permutations with repetitions. If no informa- single cycle using a single swperm instruction. This improves tion is lost in a permutation with repetitions, the permutation is upon previous results by requiring fewer instructions to permute invertible and therefore can be used in any cryptographic algo- 4-bit or larger subwords packed in a 64-bit register and fewer ex- rithm. Even if information is lost, cryptographic hash functions ecution cycles for 1-bit subwords on wide superscalar processors. and encryption algorithms based upon Feistel networks can still We also demonstrate that we can accelerate the performance of the popular DES block cipher using the proposed instructions. employ permutations with repetitions [18]. We obtain a DES performance improvement of at least 55% in constrained embedded environments and an improvement of 71% A. Past Work on a four-way superscalar processor when applying DES as a Several methods exist for performing permutations in soft- cryptographic hash function. ware. In one method, individual bits of the source datum are Index Terms—Cryptography, encryption, instruction set archi- selected and shifted to their destination locations using a series tecture, permutation, permutation instruction, processor architec- ture, subword parallelism, subword permutation. of bitwise AND, bitwise OR, and shift instructions [12]. For an arbitrary permutation of the bits in an -bit word, this proce- dure requires as many as 4 instructions. If the architecture in- I. INTRODUCTION cludes instructions such as extract and deposit [9], one S THE POPULARITY of security applications grows, can reduce the instruction count of this procedure to 2 , yet this A the underlying cryptographic algorithms consume an method is still unacceptably slow. increasingly large percentage of processor workloads. These Alternatively, we can employ lookup tables to perform per- applications often include several operations involving 1-bit mutations with repetitions in software [12]. First, we divide the or multiple-bit register subwords. Many microprocessor -bit source datum into groups of bits; we use each group to instruction set architectures have been extended to include index a unique lookup table. The output of a lookup table repre- subword-parallel integer arithmetic instructions that improve sents the input group of bits permuted per the desired permuta- performance by executing several operations on low-precision tion. The bits of the table output that do not represent any of the data in parallel. Some of these extensions include MAX [7] input bits are set to zeroes. Therefore, we can combine the out- and MAX-2 [10] for HP PA-RISC, VIS [22] for Sun SPARC, puts of the lookup tables using bitwise OR or bitwise AltiVec [5] for PowerPC, 3 DNow! by AMD [15], MMX [16] XOR operations to generate the desired permuted -bit result. for Intel IA-32, and IA-64 multimedia instructions [6], [11]. In general, assuming the extract instruction is available, Before performing subword arithmetic operations, it may be we require instructions to complete an -bit permuta- necessary to rearrange the subwords within a single register or tion using lookup tables. Each of the lookup tables consists between multiple registers using subword permutation instruc- of entries, and each entry is bits in size, so the total size tions. In addition, we can employ subword permutations to effi- of the tables is bits. This technique is commonly ciently perform transformations such as matrix transposition in used but is unattractive because the permutations must be stat- multimedia applications [8]. Certain cryptographic algorithms ically encoded in the tables at compile-time. Furthermore, the space required to store the lookup tables is large for acceptably small permutation instruction sequences. For example, we need Manuscript received May 22, 2002; revised October 3, 2002. This work was supported in part by the National Science Foundation under Grant 2 MB of storage to permute a 64-bit datum in 11 instructions CCR-0105677 and by Hewlett Packard Laboratories. using four lookup tables. With eight lookup tables, we require The authors are with the Department of Electrical Engineering, Princeton 16 kB of storage and 23 instructions to permute a 64-bit value. University, Princeton, NJ 08540 USA (email: [email protected]; [email protected]). Multiple instruction set architectures have been amended Digital Object Identifier 10.1109/TVLSI.2003.812318 to include instructions for permutations of 8-bit or larger 1063-8210/03$17.00 © 2003 IEEE 326 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 11, NO. 3, JUNE 2003 subwords. The permute instruction in the MAX-2 extension to rapidly achieve a desired level of diffusion in future ciphers. to PA-RISC supports permutations with and without repetitions As a result, the proposed instructions could greatly improve the of 16-bit subwords in a 64-bit word by statically encoding overall throughput of cryptographic algorithms. the permutation function in the instruction [10]. In IA-64, the In Section II, we discuss the mathematics of permutations and mux instruction supports a small set of permutations of 8-bit define two new instructions. We demonstrate how to apply these subwords in a 64-bit word and supports all permutations of instructions to achieve arbitrary subword permutations with rep- 16-bit subwords in a 64-bit word [6]. Similar to permute in etitions in Section III. In Section IV,we present the hardware re- MAX-2, the permutation function is statically encoded in the quired to implement the two new instructions. In Section V, we mux instruction at compile-time. The vperm instruction in the analyze the performance of permutations for differently sized AltiVec extension to the PowerPC instruction set architecture subwords, and we evaluate the performance improvement ef- permutes the 8-bit subwords of a 128-bit vector register [5]. fected by the proposed permutation instructions for a highly This instruction requires three 128-bit register reads and one popular symmetric-key encryption algorithm. We summarize in 128-bit register write, and the permutation function is encoded Section VI. in one of the vector source registers. None of the permutation instructions in popular popular instruction set architectures II. PERMUTATION INSTRUCTIONS (ISAs) efficiently support arbitrary permutations of 4-bit or We propose two new instructions to efficiently support per- smaller subwords. mutations with repetitions of 1-bit or multiple-bit subwords: Recently, researchers have proposed several instructions swperm and sieve [13]. Using these instructions, we can dy- for performing arbitrary, dynamically specified permutations namically specify permutations with repetitions during program of 1-bit or larger subwords. Using the pperm instruction, execution rather than force the permutations to be statically en- we can complete an arbitrary permutation of bits with or coded at compile-time. without repetitions in instructions [12], [20]. The xbox instruction performs -bit permutations in a similar A. Permutations With Repetitions fashion [4]. We can conduct a 64-bit permutation by executing 8 pperm or xbox or instructions followed by 7 bitwise XOR A permutation is a rearrangement of the elements in an or- or OR instructions to combine the results. The xbox and dered set, i.e., a bijective map from a set to itself [1]. In pperm instructions essentially dynamically configure and the context of this paper, such a set is not a collection of all invoke an -by- crossbar without requiring the processor to possible -bit words; we are concerned with ordered sets that maintain any additional state information. Amending an ISA are column vectors of -bit subwords. We define a surjective by requiring additional state variables would be undesirable: (i.e., one-to-many) map from an ordered set to another or- such changes require explicit operating system (OS) support dered set —where the cardinality of equals that of —to and increase the complexity of context switches and interrupts. be a permutation with repetitions.
Recommended publications
  • RISC-V Vector Extension Webinar II
    RISC-V Vector Extension Webinar II August 3th, 2021 Thang Tran, Ph.D. Principal Engineer Webinar II - Agenda • Andes overview • Vector technology background – SIMD/vector concept – Vector processor basic • RISC-V V extension ISA – Basic – CSR • RISC-V V extension ISA – Memory operations – Compute instructions • Sample codes – Matrix multiplication – Loads with RVV versions 0.8 and 1.0 • AndesCore™ NX27V • Summary Copyright© 2020 Andes Technology Corp. 2 Terminology • ACE: Andes Custom Extension • ISA: Instruction Set Architecture • CSR: Control and Status Register • GOPS: Giga Operations Per Second • SEW: Element Width (8-64) • GFLOPS: Giga Floating-Point OPS • ELEN: Largest Element Width (32 or 64) • XRF: Integer register file • XLEN: Scalar register length in bits (64) • FRF: Floating-point register file • FLEN: FP register length in bits (16-64) • VRF: Vector register file • VLEN: Vector register length in bits (128-512) • SIMD: Single Instruction Multiple Data • LMUL: Register grouping multiple (1/8-8) • MMX: Multi Media Extension • EMUL: Effective LMUL • SSE: Streaming SIMD Extension • VLMAX/MVL: Vector Length Max • AVX: Advanced Vector Extension • AVL/VL: Application Vector Length • Configurable: parameters are fixed at built time, i.e. cache size • Extensible: added instructions to ISA includes custom instructions to be added by customer • Standard extension: the reserved codes in the ISA for special purposes, i.e. FP, DSP, … • Programmable: parameters can be dynamically changed in the program Copyright© 2020 Andes Technology Corp. 3 RISC-V V Extension ISA Basic Copyright© 2020 Andes Technology Corp. 4 Vector Register ISA • Vector-Register ISA Definition: − All vector operations are between vector registers (except for load and store).
    [Show full text]
  • Optimizing Packed String Matching on AVX2 Platform
    Optimizing Packed String Matching on AVX2 Platform M. Akif Aydo˘gmu¸s1,2 and M.O˘guzhan Külekci1 1 Informatics Institute, Istanbul Technical University, Istanbul, Turkey [email protected], [email protected] 2 TUBITAK UME, Gebze-Kocaeli, Turkey Abstract. Exact string matching, searching for all occurrences of given pattern P on a text T , is a fundamental issue in computer science with many applica- tions in natural language processing, speech processing, computational biology, information retrieval, intrusion detection systems, data compression, and etc. Speeding up the pattern matching operations benefiting from the SIMD par- allelism has received attention in the recent literature, where the empirical results on previous studies revealed that SIMD parallelism significantly helps, while the performance may even be expected to get automatically enhanced with the ever increasing size of the SIMD registers. In this paper, we provide variants of the previously proposed EPSM and SSEF algorithms, which are orig- inally implemented on Intel SSE4.2 (Streaming SIMD Extensions 4.2 version with 128-bit registers). We tune the new algorithms according to Intel AVX2 platform (Advanced Vector Extensions 2 with 256-bit registers) and analyze the gain in performance with respect to the increasing length of the SIMD registers. Profiling the new algorithms by using the Intel Vtune Amplifier for detecting performance bottlenecks led us to consider the cache friendliness and shared-memory access issues in the AVX2 platform. We applied cache op- timization techniques to overcome the problems particularly addressing the search algorithms based on filtering. Experimental comparison of the new solutions with the previously known-to- be-fast algorithms on small, medium, and large alphabet text files with diverse pattern lengths showed that the algorithms on AVX2 platform optimized cache obliviously outperforms the previous solutions.
    [Show full text]
  • Optimizing Software Performance Using Vector Instructions Invited Talk at Speed-B Conference, October 19–21, 2016, Utrecht, the Netherlands
    Agner Fog, Technical University of Denmark Optimizing software performance using vector instructions Invited talk at Speed-B conference, October 19–21, 2016, Utrecht, The Netherlands. Abstract Microprocessor factories have a problem obeying Moore's law because of physical limitations. The answer is increasing parallelism in the form of multiple CPU cores and vector instructions (Single Instruction Multiple Data - SIMD). This is a challenge to software developers who have to adapt to a moving target of new instruction set additions and increasing vector sizes. Most of the software industry is lagging several years behind the available hardware because of these problems. Other challenges are tasks that cannot easily be executed with vector instructions, such as sequential algorithms and lookup tables. The talk will discuss methods for overcoming these problems and utilize the continuously growing power of microprocessors on the market. A few problems relevant to cryptographic software will be covered, and the outlook for the future will be discussed. Find more on these topics at author website: www.agner.org/optimize Moore's law The clock frequency has stopped growing due to physical limitations. Instead, the number of CPU cores and the size of vector registers is growing. Hierarchy of bottlenecks Program installation Program load, JIT compile, DLL's System database Network access Speed → File input/output Graphical user interface RAM access, cache utilization Algorithm Dependency chains CPU pipeline and execution units Remove
    [Show full text]
  • Idisa+: a Portable Model for High Performance Simd Programming
    IDISA+: A PORTABLE MODEL FOR HIGH PERFORMANCE SIMD PROGRAMMING by Hua Huang B.Eng., Beijing University of Posts and Telecommunications, 2009 a Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Computing Science Faculty of Applied Science c Hua Huang 2011 SIMON FRASER UNIVERSITY Fall 2011 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced without authorization under the conditions for Fair Dealing. Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. APPROVAL Name: Hua Huang Degree: Master of Science Title of Thesis: IDISA+: A Portable Model for High Performance SIMD Pro- gramming Examining Committee: Dr. Kay C. Wiese Associate Professor, Computing Science Simon Fraser University Chair Dr. Robert D. Cameron Professor, Computing Science Simon Fraser University Senior Supervisor Dr. Thomas C. Shermer Professor, Computing Science Simon Fraser University Supervisor Dr. Arrvindh Shriraman Assistant Professor, Computing Science Simon Fraser University SFU Examiner Date Approved: ii Declaration of Partial Copyright Licence The author, whose copyright is declared on the title page of this work, has granted to Simon Fraser University the right to lend this thesis, project or extended essay to users of the Simon Fraser University Library, and to make partial or single copies only for such users or in response to a request from the library of any other university, or other educational institution, on its own behalf or for one of its users.
    [Show full text]
  • Counter Control Flow Divergence in Compiled Query Pipelines
    Make the Most out of Your SIMD Investments: Counter Control Flow Divergence in Compiled Query Pipelines Harald Lang Andreas Kipf Linnea Passing Technical University of Munich Technical University of Munich Technical University of Munich Munich, Germany Munich, Germany Munich, Germany [email protected] [email protected] [email protected] Peter Boncz Thomas Neumann Alfons Kemper Centrum Wiskunde & Informatica Technical University of Munich Technical University of Munich Amsterdam, The Netherlands Munich, Germany Munich, Germany [email protected] [email protected] [email protected] ABSTRACT Control flow graph: SIMD lane utilization: Increasing single instruction multiple data (SIMD) capabilities in out scan σ ⋈ ⋈ ⋈ out scan σ ⋈ ... modern hardware allows for compiling efficient data-parallel query index 7 x x x x x x x pipelines. This means GPU-alike challenges arise: control flow di- traversal 6 x x Index ⋈ vergence causes underutilization of vector-processing units. In this 5 x x x paper, we present efficient algorithms for the AVX-512 architecture 4 x 3 x x x x x σ no to address this issue. These algorithms allow for fine-grained as- x x x x x x x x match SIMD lanes 2 signment of new tuples to idle SIMD lanes. Furthermore, we present 1 x x x strategies for their integration with compiled query pipelines with- scan 0 x x x out introducing inefficient memory materializations. We evaluate t our approach with a high-performance geospatial join query, which Figure 1: During query processing, individual SIMD lanes shows performance improvements of up to 35%.
    [Show full text]
  • MPC7410/MPC7400 RISC Microprocessor Reference Manual
    MPC7410/MPC7400 RISC Microprocessor Reference Manual Supports MPC7410 MPC7400 MPC7410UM/D 10/2008 Rev. 2 How to Reach Us: Home Page: www.freescale.com Web Support: http://www.freescale.com/support Information in this document is provided solely to enable system and software USA/Europe or Locations Not Listed: implementers to use Freescale Semiconductor products. There are no express or Freescale Semiconductor, Inc. implied copyright licenses granted hereunder to design or fabricate any integrated Technical Information Center, EL516 circuits or integrated circuits based on the information in this document. 2100 East Elliot Road Tempe, Arizona 85284 Freescale Semiconductor reserves the right to make changes without further notice to +1-800-521-6274 or any products herein. Freescale Semiconductor makes no warranty, representation or +1-480-768-2130 www.freescale.com/support guarantee regarding the suitability of its products for any particular purpose, nor does Freescale Semiconductor assume any liability arising out of the application or use of Europe, Middle East, and Africa: Freescale Halbleiter Deutschland GmbH any product or circuit, and specifically disclaims any and all liability, including without Technical Information Center limitation consequential or incidental damages. “Typical” parameters which may be Schatzbogen 7 provided in Freescale Semiconductor data sheets and/or specifications can and do 81829 Muenchen, Germany vary in different applications and actual performance may vary over time. All operating +44 1296 380 456 (English) +46 8 52200080 (English) parameters, including “Typicals” must be validated for each customer application by +49 89 92103 559 (German) customer’s technical experts. Freescale Semiconductor does not convey any license +33 1 69 35 48 48 (French) under its patent rights nor the rights of others.
    [Show full text]
  • A Second Generation SIMD Microprocessor Architecture
    A Second Generation SIMD Microprocessor Architecture Mike Phillip Motorola, Inc. Austin, TX [email protected] Mike Phillip 8/17/98 1 WhyWhy SIMDSIMD ?? ¥ ÒBut isnÕt that really old technology ?Ó Ð Yes, architecturally speaking, but... Ð SIMD within registers provides ÒcheapÓ interelement communictaions that wasnÕt present in prior SIMD systems ¥ Provides a reasonable tradeoff between increased computational bandwidth and manageable complexity Ð Fewer register ports needed per Òunit of useful workÓ Ð Naturally takes advantage of stream-oriented parallelism ¥ Can be easily scaled for various price/performance points ¥ Can be applied in addition to traditional techniques Mike Phillip 8/17/98 2 SomeSome AlternativesAlternatives ¥ Wider superscalar machines Benefits: High degree of flexibility; easy to program Problems: Complex implementations; higher power consumption ¥ Special purpose DSP and Media architectures Benefits: Low power; efficient use of silicon Problems: Traditional design approaches tend to limit CPU speeds; lack of generality; lack of development tools ¥ VLIW Benefits: Reduced implementation complexity; impresses your friends Problems: Need VERY long words to provide sufficient scalability; limited to compile-time visibility of parallelism; difficult to program Mike Phillip 8/17/98 3 TheThe FirstFirst GenerationGeneration ¥ First generation implementations tend to overlay SIMD instructions on existing architectural space Ð Permitted quick time to market, but limits scalability Ð Intel, Cyrix, AMD (MMX), SPARC (VIS) are
    [Show full text]
  • Effective Vectorization with Openmp 4.5
    ORNL/TM-2016/391 Effective Vectorization with OpenMP 4.5 Joseph Huber Oscar Hernandez Graham Lopez Approved for public release. Distribution is unlimited. March 2017 DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via US Department of Energy (DOE) SciTech Connect. Website: http://www.osti.gov/scitech/ Reports produced before January 1, 1996, may be purchased by members of the public from the following source: National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Telephone: 703-605-6000 (1-800-553-6847) TDD: 703-487-4639 Fax: 703-605-6900 E-mail: [email protected] Website: http://classic.ntis.gov/ Reports are available to DOE employees, DOE contractors, Energy Technology Data Ex- change representatives, and International Nuclear Information System representatives from the following source: Office of Scientific and Technical Information PO Box 62 Oak Ridge, TN 37831 Telephone: 865-576-8401 Fax: 865-576-5728 E-mail: [email protected] Website: http://www.osti.gov/contact.html This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any in- formation, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial prod- uct, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof.
    [Show full text]
  • Jon Stokes Jon
    Inside the Machine the Inside A Look Inside the Silicon Heart of Modern Computing Architecture Computer and Microprocessors to Introduction Illustrated An Computers perform countless tasks ranging from the business critical to the recreational, but regardless of how differently they may look and behave, they’re all amazingly similar in basic function. Once you understand how the microprocessor—or central processing unit (CPU)— Includes discussion of: works, you’ll have a firm grasp of the fundamental concepts at the heart of all modern computing. • Parts of the computer and microprocessor • Programming fundamentals (arithmetic Inside the Machine, from the co-founder of the highly instructions, memory accesses, control respected Ars Technica website, explains how flow instructions, and data types) microprocessors operate—what they do and how • Intermediate and advanced microprocessor they do it. The book uses analogies, full-color concepts (branch prediction and speculative diagrams, and clear language to convey the ideas execution) that form the basis of modern computing. After • Intermediate and advanced computing discussing computers in the abstract, the book concepts (instruction set architectures, examines specific microprocessors from Intel, RISC and CISC, the memory hierarchy, and IBM, and Motorola, from the original models up encoding and decoding machine language through today’s leading processors. It contains the instructions) most comprehensive and up-to-date information • 64-bit computing vs. 32-bit computing available (online or in print) on Intel’s latest • Caching and performance processors: the Pentium M, Core, and Core 2 Duo. Inside the Machine also explains technology terms Inside the Machine is perfect for students of and concepts that readers often hear but may not science and engineering, IT and business fully understand, such as “pipelining,” “L1 cache,” professionals, and the growing community “main memory,” “superscalar processing,” and of hardware tinkerers who like to dig into the “out-of-order execution.” guts of their machines.
    [Show full text]
  • Altivec Extension to Powerpc Accelerates Media Processing
    ALTIVEC EXTENSION TO POWERPC ACCELERATES MEDIA PROCESSING DESIGNED AROUND THE PREMISE THAT MULTIMEDIA WILL BE THE PRIMARY CONSUMER OF PROCESSING CYCLES IN FUTURE PCS, ALTIVEC—WHICH APPLE CALLS THE VELOCITY ENGINE—INCREASES PERFORMANCE ACROSS A BROAD SPECTRUM OF MEDIA PROCESSING APPLICATIONS. There is a clear trend in personal com- extension to a general-purpose architecture. puting toward multimedia-rich applications. But the similarity ends there. Whereas the These applications will incorporate a wide vari- other extensions were obviously constrained ety of multimedia technologies, including audio by backward compatibility and a desire to and video compression, 2D image processing, limit silicon investment to a small fraction of 3D graphics, speech and handwriting recogni- the processor die area, the primary goal for Keith Diefendorff tion, media mining, and narrow-/broadband AltiVec was high functionality. It was designed signal processing for communication. from scratch around the premise that multi- Microprocessor Report In response to this demand, major micro- media will become the primary consumer of processor vendors have announced architec- processing cycles8 in future PCs and therefore tural extensions to their general-purpose deserves first-class treatment in the CPU. Pradeep K. Dubey processors in an effort to improve their multi- Unlike most other extensions, which over- media performance. Intel extended IA-32 with load their floating-point (FP) registers to IBM Research Division MMX1 and SSE (alias KNI),2 Sun enhanced accommodate multimedia data, AltiVec ded- Sparc with VIS,3 Hewlett-Packard added icates a large new register file exclusively to it. MAX4 to its PA-RISC architecture, Silicon Although overloading the FP registers avoids Ron Hochsprung Graphics extended the MIPS architecture with new architectural state, eliminating the need MDMX,5 and Digital (now Compaq) added to modify the operating system, it also signif- Apple Computer MVI to Alpha.
    [Show full text]
  • Register Level Sort Algorithm on Multi-Core SIMD Processors
    Register Level Sort Algorithm on Multi-Core SIMD Processors Tian Xiaochen, Kamil Rocki and Reiji Suda Graduate School of Information Science and Technology The University of Tokyo & CREST, JST {xchen, kamil.rocki, reiji}@is.s.u-tokyo.ac.jp ABSTRACT simultaneously. GPU employs a similar architecture: single- State-of-the-art hardware increasingly utilizes SIMD paral- instruction-multiple-threads(SIMT). On K20, each SMX has lelism, where multiple processing elements execute the same 192 CUDA cores which act as individual threads. Even a instruction on multiple data points simultaneously. How- desktop type multi-core x86 platform such as i7 Haswell ever, irregular and data intensive algorithms are not well CPU family supports AVX2 instruction set (256 bits). De- suited for such architectures. Due to their importance, it veloping algorithms that support multi-core SIMD architec- is crucial to obtain efficient implementations. One example ture is the precondition to unleash the performance of these of such a task is sort, a fundamental problem in computer processors. Without exploiting this kind of parallelism, only science. In this paper we analyze distinct memory accessing a small fraction of computational power can be utilized. models and propose two methods to employ highly efficient Parallel sort as well as sort in general is fundamental and bitonic merge sort using SIMD instructions as register level well studied problem in computer science. Algorithms such sort. We achieve nearly 270x speedup (525M integers/s) on as Bitonic-Merge Sort or Odd Even Merge Sort are widely a 4M integer set using Xeon Phi coprocessor, where SIMD used in practice.
    [Show full text]
  • G4 Is First Powerpc with Altivec: 11/16/98
    G4 Is First PowerPC With AltiVec Due Mid-1999, Motorola’s Next Chip Aims at Macintosh, Networking by Linley Gwennap the original PowerPC 603. The integer core uses a simple five-stage pipeline (four stages for ALU operations) with a Motorola will extend its PowerPC limited amount of instruction reordering. Each cycle, the line with the first G4 processor core, CPU can issue two instructions plus a branch. As Figure 1 which it unveiled at last month’s shows, integer execution resources include dual ALUs plus a Microprocessor Forum. According to project leader Paul “system” unit (which handles the more complicated integer Reed, the new core adds a faster floating-point unit to the instructions) and a load/store unit. older G3 core and doubles its cache and system-bus band- Although the integer core was deemed acceptable, width. The G4 is also the first chip to incorporate the AltiVec Motorola felt the floating-point unit needed improvement. extensions, which greatly increase performance on many For single-precision instructions, the G3 FPU is fully pipe- bandwidth- or compute-intensive applications, including lined with a three-cycle latency, but it requires an extra cycle both integer and floating-point algorithms. The chip is already for double-precision operations, halving the issue rate and sampling and is due to appear in products by mid-1999. increasing the latency. The G4 FPU, however, is fully After IBM pulled out of Somerset (see MPR 6/22/98, pipelined, even for double-precision operations. Most tech- p. 4), the G4 became the sole property of Motorola; IBM has nical FP applications use double precision and will see a no plans to sell the part.
    [Show full text]