Hardware-based hash functions for network applications

Fumito Yamaguchi, Hiroaki Nishi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

39 Citations (Scopus)


For rich network services, it is indispensable to reconstruct TCP stream in the middle of the network. In this reconstruction function, managing a large number of streams is a crucial as an embedded hardware for achieving high-throughput processing. In this case, hashing is a well-used solution as an ID key of TCP streams. Since CRC hashes have simple tree structure of XOR logics and are perfectly composed of combination logics, they can easily be hardware implemented and enables low-latency calculation of the hash values. Therefore, CRC hash has been used in network applications where low-latency and high speed operations are necessary. Some of their usages include data identification, load balancing, encryption, and checksum. Although CRC hashes may be well suited for hardware implementation, it is not the top choice when collision rates and distribution of hash values are considered. For some network workloads, CRC hashing shows very uneven distribution of hash values and can lead to decrease in the overall performance of network systems. In this study, two hashes, Jenkins hash and MurmurHash, are implemented on a FPGA as TCP connection manager and evaluated for their aptitude for hashing used in hardware-based network applications.

Original languageEnglish
Title of host publication2013 19th IEEE International Conference on Networks, ICON 2013
PublisherIEEE Computer Society
ISBN (Print)9781479920846
Publication statusPublished - 2013
Event2013 19th IEEE International Conference on Networks, ICON 2013 - Singapore, Singapore
Duration: 2013 Dec 112013 Dec 13

Publication series

NameIEEE International Conference on Networks, ICON
ISSN (Print)1556-6463


Other2013 19th IEEE International Conference on Networks, ICON 2013


  • FPGA
  • Hardware Implementation
  • Hashing
  • TCP Connection Manager

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering
  • Safety, Risk, Reliability and Quality


Dive into the research topics of 'Hardware-based hash functions for network applications'. Together they form a unique fingerprint.

Cite this