GALS System Design. Side Channel Attack Secure Cryptographic Accelerators. Frank K. Gürkaynak. Integrated Systems Laboratory ETH Zurich

Size: px
Start display at page:

Download "GALS System Design. Side Channel Attack Secure Cryptographic Accelerators. Frank K. Gürkaynak. Integrated Systems Laboratory ETH Zurich"

Transcription

1 GLS System esign Side Channel ttack Secure Cryptographic ccelerators Frank K. Gürkaynak Integrated Systems Laboratory ETH Zurich 22 November 2005 Ph.. Thesis Presentation

2 Intro GLS Crypto cacia Results G C R KGF Contents Motivation Outline 1 Outline 2 Globally-synchronous Locally-Synchronous (GLS) esign 3 Cryptography 4 GLS implementation of the ES lgorithm 5 Results and Conclusions GLS System esign kgf, Integrated Systems Laboratory (IIS) 2 / 48

3 Intro GLS Crypto cacia Results G C R KGF Contents Motivation What is wrong with the way we design chips now? Modern System-on-Chip circuits... Contain millions of transistors Require clock rates exceeding 100s of MHz Include 100s of subblocks Use 10s of different clock domains GLS System esign kgf, Integrated Systems Laboratory (IIS) 3 / 48

4 Intro GLS Crypto cacia Results G C R KGF Contents Motivation What is wrong with the way we design chips now? Modern System-on-Chip circuits... Contain millions of transistors, trend increasing Require clock rates exceeding 100s of MHz, trend increasing Include 100s of subblocks, trend increasing Use 10s of different clock domains, trend increasing GLS System esign kgf, Integrated Systems Laboratory (IIS) 3 / 48

5 Intro GLS Crypto cacia Results G C R KGF Contents Motivation What is wrong with the way we design chips now? Modern System-on-Chip circuits... Contain millions of transistors, trend increasing Require clock rates exceeding 100s of MHz, trend increasing Include 100s of subblocks, trend increasing Use 10s of different clock domains, trend increasing... are not easy to design The clock signal must be distributed to an increasing number of elements with increased precision Many independently designed components must be combined to a large system. ll subsystems must be able to reliably exchange data GLS System esign kgf, Integrated Systems Laboratory (IIS) 3 / 48

6 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Globally-synchronous Locally-Synchronous esign GLS is a methodology to enable the design of complex digital systems on chip. System is divided into smaller GLS modules Each module works synchronously Interconnected modules communicate asynchronously GLS System esign kgf, Integrated Systems Laboratory (IIS) 4 / 48

7 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Globally-synchronous Locally-Synchronous esign GLS is a methodology to enable the design of complex digital systems on chip. System is divided into smaller GLS modules Each module works synchronously Interconnected modules communicate asynchronously Was first developed by. Chapiro in 1984 First chip implementation by J. Muttersbach in 1999 GLS System esign kgf, Integrated Systems Laboratory (IIS) 4 / 48

8 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Globally-synchronous Locally-Synchronous esign GLS is a methodology to enable the design of complex digital systems on chip. System is divided into smaller GLS modules Each module works synchronously Interconnected modules communicate asynchronously Was first developed by. Chapiro in 1984 First chip implementation by J. Muttersbach in 1999 GLS implementations differ in: synchronization method between blocks specific asynchronous communication protocol used GLS System esign kgf, Integrated Systems Laboratory (IIS) 4 / 48

9 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Basic GLS Structure ata Synchronous Block Synchronous Block B Clk Clk Synchronous system Two large functional blocks of a synchronous system GLS System esign kgf, Integrated Systems Laboratory (IIS) 5 / 48

10 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Basic GLS Structure GLS Module GLS Module B Locally Synchronous Island ataout atain Locally Synchronous Island B Lclk Lclk Local Clock Generator Local Clock Generator Local clock generators GLS modules are formed by adding a local clock generator for each functional block GLS System esign kgf, Integrated Systems Laboratory (IIS) 5 / 48

11 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Basic GLS Structure GLS Module GLS Module B Locally Synchronous Island Pen Ta ataout Port Req ck atain Port Pen Ta Locally Synchronous Island B Lclk Local Clock Generator Ri i Ri i Lclk Local Clock Generator GLS system Port controllers are added to regulate data transfers between GLS modules GLS System esign kgf, Integrated Systems Laboratory (IIS) 5 / 48

12 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages GLS Works GLS at IIS J. Muttersbach First implementation T. Villiger S. Oetiker F. K. Gürkaynak GLS System esign kgf, Integrated Systems Laboratory (IIS) 6 / 48

13 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages GLS Works GLS at IIS J. Muttersbach T. Villiger Multi-point interconnect S. Oetiker F. K. Gürkaynak GLS System esign kgf, Integrated Systems Laboratory (IIS) 6 / 48

14 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages GLS Works GLS at IIS J. Muttersbach T. Villiger S. Oetiker Local clock generators F. K. Gürkaynak GLS System esign kgf, Integrated Systems Laboratory (IIS) 6 / 48

15 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages GLS Works GLS at IIS J. Muttersbach T. Villiger S. Oetiker F. K. Gürkaynak esign and test flow GLS System esign kgf, Integrated Systems Laboratory (IIS) 6 / 48

16 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Why GLS? dvantages No global clock distribution problems Modular design flow Potential for low-power design Offers new possibilities for designers GLS System esign kgf, Integrated Systems Laboratory (IIS) 7 / 48

17 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P Cryptography 101 LICE OSCR BOB Plain-text Encryption Cipher-text ecryption Plain-text Cipher-key Cipher-key Private key ciphers lice encrypts plain-text information by using a cipher-key. Bob can decrypt the resulting cipher-text only if he has access to the same cipher-key. GLS System esign kgf, Integrated Systems Laboratory (IIS) 8 / 48

18 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P Cryptography 102 LICE OSCR BOB Plain-text Encryption Cipher-text ecryption Plain-text Cipher-key Cipher-key Security Oscar wishes to obtain the plain-text Oscar knows everything about the cryptographic algorithm Oscar can observe/modify the cipher-text but.. GLS System esign kgf, Integrated Systems Laboratory (IIS) 9 / 48

19 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P Cryptography 102 LICE OSCR BOB Plain-text Encryption Cipher-text ecryption Plain-text Cipher-key Cipher-key Security Oscar wishes to obtain the plain-text Oscar knows everything about the cryptographic algorithm Oscar can observe/modify the cipher-text but.. Oscar does not know the cipher-key GLS System esign kgf, Integrated Systems Laboratory (IIS) 9 / 48

20 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P dvanced Encryption Standard (ES) Plaintext RoundKey ES Standard by NIST bit data 128 bit key 10/12/14 rounds Components ShiftRows State Register S00 S10 S20 S30 S01 S11 S21 S31 S02 S12 S22 S32 S03 S13 S23 S33 ShiftRows ddroundkey SubBytes MixColumns X X X X X X X X X X X X X X X X Ciphertext GLS System esign kgf, Integrated Systems Laboratory (IIS) 10 / 48

21 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P dvanced Encryption Standard (ES) Plaintext RoundKey ES Standard by NIST bit data 128 bit key 10/12/14 rounds Components ShiftRows ddroundkey State Register S00 S10 S20 S30 S01 S11 S21 S31 S02 S12 S22 S32 S03 S13 S23 S33 ShiftRows ddroundkey SubBytes MixColumns X X X X X X X X X X X X X X X X Ciphertext GLS System esign kgf, Integrated Systems Laboratory (IIS) 10 / 48

22 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P dvanced Encryption Standard (ES) Plaintext RoundKey ES Standard by NIST bit data 128 bit key 10/12/14 rounds Components ShiftRows ddroundkey SubBytes State Register S00 S10 S20 S30 S01 S11 S21 S31 S02 S12 S22 S32 S03 S13 S23 S33 ShiftRows ddroundkey SubBytes MixColumns X X X X X X X X X X X X X X X X Ciphertext GLS System esign kgf, Integrated Systems Laboratory (IIS) 10 / 48

23 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P dvanced Encryption Standard (ES) Plaintext RoundKey ES Standard by NIST bit data 128 bit key 10/12/14 rounds Components ShiftRows ddroundkey SubBytes MixColumns State Register S00 S10 S20 S30 S01 S11 S21 S31 S02 S12 S22 S32 S03 S13 S23 S33 ShiftRows ddroundkey SubBytes MixColumns X X X X X X X X X X X X X X X X Ciphertext GLS System esign kgf, Integrated Systems Laboratory (IIS) 10 / 48

24 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P Side-Channels Once an otherwise secure algorithm is implemented in either Hardware or Software it gains physical properties that can be observed: Time required to finish the operation Power consumption Electromagnetic Radiation Heat dissipation Sound These properties are called Side Channels Side-Channel ttacks In 1996, P. Kocher showed that it is possible to obtain additional information on the cipher-key by observing these side-channels. GLS System esign kgf, Integrated Systems Laboratory (IIS) 11 / 48

25 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P ifferential Power nalysis (P) 1 Select a subkey and a target operation 2 Use a simple model to predict the power consumption for S input vectors Cryptographic Hardware Under ttack Measurement S input vectors Simple Power Model of Cryptographic Hardware P 0 P 1 P 2 S vectors H 0,0 H 1,0 H 0,1 H 1,1 H 0,2 H 1,2 H K,0 H K,1 H K,2 P S H 0,S H 1,S H K,S Statistical Evaluation of Model and Measurement GLS System esign kgf, Integrated Systems Laboratory (IIS) 12 / 48

26 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P ifferential Power nalysis (P) 1 Select a subkey and a target operation 2 Use a simple model to predict the power consumption for S input vectors 3 predict the power consumption for all K subkey permutations Cryptographic Hardware Under ttack Measurement P 0 P 1 P 2 S input vectors S vectors Simple Power Model of Cryptographic Hardware K subkeys H 0,0 H 0,1 H 0,2 H 1,0 H 1,1 H 1,2 H K,0 H K,1 H K,2 P S H 0,S H 1,S H K,S Statistical Evaluation of Model and Measurement GLS System esign kgf, Integrated Systems Laboratory (IIS) 12 / 48

27 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P ifferential Power nalysis (P) 1 Select a subkey and a target operation 2 Use a simple model to predict the power consumption for S input vectors 3 predict the power consumption for all K subkey permutations 4 Measure the power consumption using the same S input vectors Cryptographic Hardware Under ttack Side Channel Information Measurement S vectors P 0 P 1 P 2 P S S input vectors Simple Power Model of Cryptographic Hardware H 0,0 H 0,1 H 0,2 H 0,S H 1,0 H 1,1 H 1,2 H 1,S H K,0 H K,1 H K,2 H K,S Statistical Evaluation of Model and Measurement GLS System esign kgf, Integrated Systems Laboratory (IIS) 12 / 48

28 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P ifferential Power nalysis (P) 1 Select a subkey and a target operation 2 Use a simple model to predict the power consumption for S input vectors 3 predict the power consumption for all K subkey permutations 4 Measure the power consumption using the same S input vectors 5 etermine if one of the power hypotheses shows a distinctively higher correlation to the measurement. Cryptographic Hardware Under ttack Measurement S vectors S input vectors S vectors Statistical Evaluation of Model and Measurement Simple Power Model of Cryptographic Hardware K subkeys GLS System esign kgf, Integrated Systems Laboratory (IIS) 12 / 48 P 0 P 1 P 2 P S? H 0,0 H 0,1 H 0,2 H 0,S H 1,0 H 1,1 H 1,2 H 1,S H K,0 H K,1 H K,2 H K,S

29 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock CCI Clock Handshake ata 16 Block iagram The GLS implementation is called cacia. Operations are divided between a 128-bit Goliath and a 32-bit avid unit GOLITH Key Generator Round Key Memory INTERFCE bit Reg ddroundkey ShiftRows 32 VI 32-bit Reg SubBytes MixColumns GLS System esign kgf, Integrated Systems Laboratory (IIS) 13 / 48

30 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock CCI Clock Handshake ata 16 Block iagram The GLS implementation is called cacia. Operations are divided between a 128-bit Goliath and a 32-bit avid unit avid and Goliath are separate GLS modules GOLITH_GLS GOLITH Key Generator Round Key Memory INTERFCE 128 g2s 128-bit Reg ddroundkey ShiftRows Local Clock Generator g2d 32 VI_GLS d2g VI 32-bit Reg SubBytes MixColumns Local Clock Generator GLS System esign kgf, Integrated Systems Laboratory (IIS) 13 / 48

31 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Block iagram The GLS implementation is called cacia. Operations are divided between a 128-bit Goliath and a 32-bit avid unit avid and Goliath are separate GLS modules There is a second avid unit running in parallel. One round of ES requires 1 Goliath and 4 avid operations. CCI Clock Handshake ata 16 GOLITH_GLS Local Clock Generator GOLITH g2d d2g Key Generator Round Key Memory 32 VI_GLS 32-bit Reg SubBytes MixColumns VI Local Clock Generator g2s VI 128 VI_GLS INTERFCE 128-bit Reg ddroundkey ShiftRows 32-bit Reg SubBytes 32 MixColumns g2d d2g Local Clock Generator GLS System esign kgf, Integrated Systems Laboratory (IIS) 13 / 48

32 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ddkey / ShiftR S01 S02 S03 S04 MixC 1 S05 S06 S07 S08 MixC 2 S09 S10 S11 S12 MixC 3 S13 S14 S15 S16 MixC 4 Normal Operation The attacker will normally target a single operation, and will measure the power consumption of this particular clock cycle. GLS System esign kgf, Integrated Systems Laboratory (IIS) 14 / 48

33 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented countermeasures ummy Oper. ummy Oper. ddkey / ShiftR S01 S02 S03 S04 S05 S06 S07 S08 S09 S10 S11 S12 S13 S14 S15 S16 ummy MixC 1 ummy ummy MixC 2 MixC 3 MixC 4 Inserting dummy operations Inserting random dummy cycles will confuse the attacker, since the targeted operation will not always be executed at a specific clock cycle. Unfortunately, this also increases the run-time. GLS System esign kgf, Integrated Systems Laboratory (IIS) 15 / 48

34 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ummy Oper. ummy Oper. ddkey / ShiftR S06 S08 S07 S05 S16 S14 S15 S13 S04 S02 S03 S01 S12 S10 S09 S11 ummy ummy MixC 2 MixC 4 ummy MixC 1 MixC 3 Change ordering of operations Independent operations can be re-ordered arbitrarily. Contrary to inserting dummy cycles, this does not increase the run-time. GLS System esign kgf, Integrated Systems Laboratory (IIS) 16 / 48

35 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ummy Oper. ummy Oper. ddkey / ShiftR S06 S16 S08 S07 S05 S14 S15 S13 ummy ummy MixC 2 MixC 4 S04 S02 S03 S01 S12 S10 S09 S11 MixC 3 ummy MixC 1 Parallelization Executing operations in parallel creates more activity at the same time, this appears as noise for the attacker. GLS System esign kgf, Integrated Systems Laboratory (IIS) 17 / 48

36 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ummy Oper. ummy Oper. ddkey / ShiftR S06 S08 S07 S05 S16 S14 S13 S15 ummy ummy MixC 2 MixC 4 S12 S09 S10 S11 S02 S03 S04 S01 MixC 3 ummy MixC 1 Parallelization Executing operations in parallel creates more activity at the same time, this appears as noise for the attacker. GLS System esign kgf, Integrated Systems Laboratory (IIS) 17 / 48

37 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ummy ummy ummy ummy Oper. ummy Oper. ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ddkey / ShiftR ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. S06 S08 S02 S03 S07 S05 S04 S01 MixC 4 MixC 3 MixC 2 MixC 1 S16 S14 S13 S12 S09 S15 S10 S11 Parallelization Executing operations in parallel creates more activity at the same time, this appears as noise for the attacker. GLS System esign kgf, Integrated Systems Laboratory (IIS) 17 / 48

38 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures Goliath ummy ummy ummy ummy Oper. ummy Oper. ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ddkey / ShiftR ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. S06 S08 S02 S03 S07 S05 S04 S01 MixC 4 MixC 3 MixC 2 MixC 1 ummy Oper. avid Perels avid Tschopp S16 S14 S13 S12 S09 S15 S10 S11 Introducing GLS modules GLS modules have their own local clock generator, their clocks are independent and can not be controlled by the attacker GLS System esign kgf, Integrated Systems Laboratory (IIS) 18 / 48

39 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures Goliath ummy ummy ummy ummy Oper. ummy Oper. ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ddkey / ShiftR ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. S06 S08 S02 S03 S07 S05 S04 S01 MixC 4 MixC 3 MixC 2 MixC 1 ummy Oper. avid Perels avid Tschopp ummy S16 S14 S13 S12 S09 S15 S10 S11 Variable clock periods Each GLS module can randomly change its own clock period. This adds even more uncertainity GLS System esign kgf, Integrated Systems Laboratory (IIS) 19 / 48

40 Intro GLS Crypto cacia Results G C R KGF Chip Conclusions Final Chip Photo cacia UMC 0.25 µm CMOS Total area 1.75 mm 2 avid mm 2 Goliath mm 2 Sync mm 2 Rate Mb/s Energy mj/mb This part of the chip occupied by two independent ES designs: Baby and Pampers Synchronous Interface & Reference esign Clockgen Clockgen avid g2s Goliath d2g g2d d2g g2d Clockgen avid GLS System esign kgf, Integrated Systems Laboratory (IIS) 20 / 48

41 Intro GLS Crypto cacia Results G C R KGF Chip Conclusions Final Conclusions Conclusions novel GLS based crypto SIC implementing the ES algorithm was presented. In addition to traditional P countermeasures, the chip also includes GLS modules that use randomly varying clocks which make known attacks extremely difficult The GLS design methodology was refined. The presented design was designed using mainly standard E tools. combination of functional and scan-chain based testing allows a stuck-at-coverage of more than 99.8%. GLS System esign kgf, Integrated Systems Laboratory (IIS) 21 / 48

42 Intro GLS Crypto cacia Results G C R KGF Chip Conclusions Final Conclusions Conclusions novel GLS based crypto SIC implementing the ES algorithm was presented. In addition to traditional P countermeasures, the chip also includes GLS modules that use randomly varying clocks which make known attacks extremely difficult The GLS design methodology was refined. The presented design was designed using mainly standard E tools. combination of functional and scan-chain based testing allows a stuck-at-coverage of more than 99.8%. Is this really secure? We don t know yet. The security has to be evaluated by cryptanalysts. GLS System esign kgf, Integrated Systems Laboratory (IIS) 21 / 48

43 Intro GLS Crypto cacia Results G C R KGF Chip Conclusions Final QUESTIONS? cknowledgements for GLS Stephan Oetiker, Thomas Villiger, Hubert Kaeslin, Norbert Felber cknowledgements for Crypto-chips Stefan chleitner, Gérard Basler, ndres Erni, ominique Gasser, Peter Haldi, Franco Hug, drian Lutz, Norbert Pramstaller, Stefan Reichmuth, Pieter Rommens, Jürg Treichler, Stefan Zwicky and ndreas Burg, Matthias Braendli, Stefan Eberli, Simon Haene Stefan Mangard, Elisabeth Oswald, S. Berna Örs GLS System esign kgf, Integrated Systems Laboratory (IIS) 22 / 48

44 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Receiving GLS Module Req ck Local Clock Generator Ri i 1 GLS port is activated by the Pen signal, which enables Req GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48

45 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Receiving GLS Module Req ck Local Clock Generator Ri i 2 The receiving GLS module sets ck, clock pause request Ri is set GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48

46 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Receiving GLS Module Req ck Local Clock Generator Ri i 3 The clock pause is acknowledged by i, the LS Island is paused GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48

47 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Local clock is paused Receiving GLS Module Req ck Local Clock Generator Ri i 4 ata transfer is complete, Ta is set and Req is reset GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48

48 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Local clock is paused Receiving GLS Module Req ck Local Clock Generator Ri i 5 ll handshake signals return to their initial values, local clock is released GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48

49 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Local clock is paused Receiving GLS Module Req ck Local Clock Generator Ri i 6 Normal operation resumes, Ta remains active until the Pen is reset GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48

50 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Local Clock Generator Ri i Ri i LClk elcntrlxsi ExtClk MUTEX MUTEX elay Register Programmable elay Line Muller-C elcntrlxsi(0) elcntrlxsi(1) elcntrlxsi(2) elcntrlxsi(15) ClkToelayxCI MUX22 N22 1 O212 N22 O212 N22 O212 0 N22 ClkelayedxCO 1 Fine elay elay Slice elay Slice elay Slice elay Slice GLS System esign kgf, Integrated Systems Laboratory (IIS) 24 / 48

51 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Mutual exclusion element Vdd 3.9µ 0.24µ 3.9µ 0.24µ R1 2.56µ 0.24µ 2.56µ 0.24µ 3.9µ 0.24µ 1.28µ 0.24µ G2 Vdd 3.9µ 0.24µ 3.9µ 0.24µ R2 2.56µ 0.24µ 2.56µ 0.24µ 3.9µ 0.24µ 1.28µ 0.24µ G1 GLS System esign kgf, Integrated Systems Laboratory (IIS) 25 / 48

52 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow esign flow for GLS (as used in Shir-Khan) Self-timed library.stg 3 (UCS).eqn eqn2gate (ETHZ).v Signal Trans. Logic Graph Equations Local clock generator Gate Level Netlist.vhdl esign nalyzer (Synopsys).v Silicon Ensemble (Cadence).lef Pearl Timing n. (Cadence).tlf VHL Gate Level Source Code Netlist SIM micro-controller MacroCell Layout Timing Model.vhdl esign nalyzer (Synopsys).v Silicon Ensemble (Cadence).lef Pearl Timing n. (Cadence).tlf VHL Source Code GLS modules Gate Level Netlist MacroCell Layout Timing Model.gals module assembler (ETHZ).vhdl esign nalyzer (Synopsys).v Silicon Ensemble (Cadence).lef Pearl Timing n. (Cadence).tlf Configuration File.scr VHL Source Code Gate Level Netlist MacroCell Layout Timing Model Control Scripts GLS system.vhdl esign nalyzer (Synopsys).v Silicon.lef Pearl Calibre Ensemble Timing n. RC/LVS (Cadence) (Cadence) (Mentor).gds VHL Source Code Gate Level Netlist Layout Final Layout GLS System esign kgf, Integrated Systems Laboratory (IIS) 26 / 48

53 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup ES implementations at IIS Riddler Fastcore res Baby / Pampers 2 x 128 bit parallel 128 bit 128 / 32 bit 16 bit 2.16 Gb/s (pipelined) 2.12 Gb/s 1.15 Gb/s (128 bit) / Gbit/s 37.8 mm 2 (0.6 µm) 3.56 mm 2 (0.25 µm) 1.2 mm 2 (0.25 µm) 0.35 / 0.58 mm 2 (0.25 µm En/ecryption (ECB) En/ecryption (all) Encryption (ECB/OFB) Encryption (ECB/OFB) Parallel atapath Independent Enc/ec Includes masking Plain / Countermeasures GLS System esign kgf, Integrated Systems Laboratory (IIS) 27 / 48

54 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup SubBytes determines ES performance atapath width 8-bit 16-bit 32-bit 64-bit 128-bit Parallel SubBytes units Complexity (gate eq) 5,052 6,281 7,155 11,628 20,410 rea (normalized) Clock cycles for ES Critical path (normalized) Total time (normalized) GLS System esign kgf, Integrated Systems Laboratory (IIS) 28 / 48

55 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup Countermeasures against P attacks Protect your weak spots P measures power consumption dd Noise (unrelated switching activity) to confuse the measurements P targets a specific operation Change the operation order by inserting Random Operations Power consumption of CMOS is data dependent Use lternative Logic Styles There are direct operations between input and output Prevent direct operations by Masking the key with random data GLS System esign kgf, Integrated Systems Laboratory (IIS) 29 / 48

56 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup P attacks work Key 0x Correlation Number of measurements GLS System esign kgf, Integrated Systems Laboratory (IIS) 30 / 48

57 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup P attack setup GLS System esign kgf, Integrated Systems Laboratory (IIS) 31 / 48

58 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag rea overhead of GLS avid Goliath rea µm 2 183, % 551, % rea µm 2 -LSFRs 26, % 73, % rea µm 2 -ClockGen 7, % 7, % rea µm 2 -Ports 6, % 11, % rea µm 2 -GLS 196, % 570, % rea µm 2 -TOTL 963,855 GLS System esign kgf, Integrated Systems Laboratory (IIS) 32 / 48

59 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Latency overhead of GLS Synchronous GLS+P avid Goliath avid Goliath Critical path (ns) Latency (cycles) Clock freq. (MHz) Enc(clock cycles) Enc time (ns) GLS System esign kgf, Integrated Systems Laboratory (IIS) 33 / 48

60 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Block diagram of avid atainxi ataoutxo 32 PolicyxI ModexSI PenxSO TaxSI ebugatainxi ebugenxsi ebugclkxci bit LFSR Controller Reg ffine Transform InvMixColumns Mult. Inverse Mult. Inverse MixColumns Inverse ffine T. Multiplicative Inverse Output Select ffine Transformation MixColumns GLS System esign kgf, Integrated Systems Laboratory (IIS) 34 / 48

61 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Block diagram of Goliath atainxi ataoutxo ebugatainxi ebugddrinxi ebugenxsi ebugclkxci ModexSI PenxSO TaxSI bit LFSR 128 Controller Reg InvShiftRows Key Expansion x 32 SRM Reg-32 Reg-32 ddroundkey Output Select ShiftRows Reg-128 avid Communication ShiftRows ddroundkey Round Key Generator ToavidTxO FrmavidTxI FrmavidPxI ToavidPxO GLS System esign kgf, Integrated Systems Laboratory (IIS) 35 / 48

62 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Goliath to Synchronous Interface Req+ Pen+ O211 Ri+ Pen i Ta INV1 i+ ck+ Req- Ta+ Ta- Req i OR21 Pen Req i Req NN41 NN21 NN31 Ri NN21 ck- Ri- Pen- i i- Req i N21 ck GLS System esign kgf, Integrated Systems Laboratory (IIS) 36 / 48

63 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Goliath to avid O211 Pen+ i Pen Ta Req+ Ri+ Pen- Ta- O211 INV1 i+ INV1 ck+ Ta+ i- Req N21 Pen Ri ck- Req- Ri- N21 i ck GLS System esign kgf, Integrated Systems Laboratory (IIS) 37 / 48

64 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag avid to Goliath Ta- O211 i- Pen- Pen+ Pen i Z INV1 N21 Ri- Req+ Pen Req BUFL ck- ck+ ck Ri INV1 Req- Ta+ Ri+ i i+ Z OR21 Pen N31 Ta GLS System esign kgf, Integrated Systems Laboratory (IIS) 38 / 48

65 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Scan-test configuration GLS Module LS Island GLS Module LS Island Pen Ta FSM Req ck FSM Pen Ta Lclk Ri i Ri i Lclk Local Clock Local Clock Generator Local Clock Local Clock Generator ScanIn ScanEn ScanClk ScanOut GLS System esign kgf, Integrated Systems Laboratory (IIS) 39 / 48

66 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Stuck-at-fault test coverage Stuck-at-fault testing There are a total of stuck-at faults in the entire circuit Only 182 of these faults are within the asynchronous finite state machines straighforward test vector generation using TetraMax fails to detect faults Using a simple encryption/decryption operation of these faults were detected by simulation. The total test coverage obtained by combining these two methods exceeds 99.8%. GLS System esign kgf, Integrated Systems Laboratory (IIS) 40 / 48

67 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode istribution of the first SubBytes operation Frequency Frequency Frequency Frequency Mode 00 : s fast as possible Mode 01 : Slightly Random Mode 10 : Mostly Random Mode11: Pre-programmed Policy Time [ns] GLS System esign kgf, Integrated Systems Laboratory (IIS) 41 / 48

68 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Simulation result Interface Clk Req ck Req Input for Next Operation ck Output of Last Operation Strb Goliath Request to start cknowledge Req ck Start End Clk avid Tschopp more random less random fast less random more random Clock Pause Req ck Clk avid Perels Req ck Clk ~100MHz ~120MHz ~170MHz ~190MHz ~200MHz ~200MHz ~200MHz ~190MHz ~180MHz ~150MHz 7200 ns 7600 ns 8 us GLS System esign kgf, Integrated Systems Laboratory (IIS) 42 / 48

69 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Operation modes of cacia Operation I/O Clock Encr. Throughput Energy Mode [MHz] [ns] [Mb/s] [mj/mb] cacia cacia cacia , cacia Synchronous GLS System esign kgf, Integrated Systems Laboratory (IIS) 43 / 48

70 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Clock period versus delay-line settings cacia Local Clock Generator Period (Chip #1) 14 Goliath. Perels. Tschopp Simulation 12 Local Clock Period [ns] Number of elay Slices GLS System esign kgf, Integrated Systems Laboratory (IIS) 44 / 48

71 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Clock frequency versus delay-line settings Goliath Clock Generator Frequency (Chip #1-Chip #14) Chip #1 Chip #14 Simulation Local Clock Frequency [MHz] Number of elay Slices GLS System esign kgf, Integrated Systems Laboratory (IIS) 45 / 48

72 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Power consumption vs maximum GLS module frequency 260 cacia Power issipation 240 Power Consumption [mw] Clock Frequency of GLS Modules [MHz] GLS System esign kgf, Integrated Systems Laboratory (IIS) 46 / 48

73 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Power consumption of different operation modes Mode00 Mode01 Mode10 Mode11 cacia Power issipation with ifferent Operation Modes 230 Power Consumption [mw] I/O Clock Period [MHz] GLS System esign kgf, Integrated Systems Laboratory (IIS) 47 / 48

74 Intro GLS Crypto cacia Results G C R KGF F. Kağan Gürkaynak in KG GLS System esign kgf, Integrated Systems Laboratory (IIS) 48 / 48

Scan. This is a sample of the first 15 pages of the Scan chapter.

Scan. This is a sample of the first 15 pages of the Scan chapter. Scan This is a sample of the first 15 pages of the Scan chapter. Note: The book is NOT Pinted in color. Objectives: This section provides: An overview of Scan An introduction to Test Sequences and Test

More information

Fully Pipelined High Speed SB and MC of AES Based on FPGA

Fully Pipelined High Speed SB and MC of AES Based on FPGA Fully Pipelined High Speed SB and MC of AES Based on FPGA S.Sankar Ganesh #1, J.Jean Jenifer Nesam 2 1 Assistant.Professor,VIT University Tamil Nadu,India. 1 s.sankarganesh@vit.ac.in 2 jeanjenifer@rediffmail.com

More information

ECEN454 Digital Integrated Circuit Design. Sequential Circuits. Sequencing. Output depends on current inputs

ECEN454 Digital Integrated Circuit Design. Sequential Circuits. Sequencing. Output depends on current inputs ECEN454 igital Integrated Circuit esign Sequential Circuits ECEN 454 Combinational logic Sequencing Output depends on current inputs Sequential logic Output depends on current and previous inputs Requires

More information

Lecture 10: Sequential Circuits

Lecture 10: Sequential Circuits Introduction to CMOS VLSI esign Lecture 10: Sequential Circuits avid Harris Harvey Mudd College Spring 2004 1 Outline Floorplanning Sequencing Sequencing Element esign Max and Min-elay Clock Skew Time

More information

Chapter 7 Sequential Circuits

Chapter 7 Sequential Circuits Chapter 7 Sequential Circuits Jin-Fu Li Advanced Reliable Systems (ARES) Lab. epartment of Electrical Engineering National Central University Jungli, Taiwan Outline Latches & Registers Sequencing Timing

More information

Testing of Cryptographic Hardware

Testing of Cryptographic Hardware Testing of Cryptographic Hardware Presented by: Debdeep Mukhopadhyay Dept of Computer Science and Engineering, Indian Institute of Technology Madras Motivation Behind the Work VLSI of Cryptosystems have

More information

Lecture 23 Design for Testability (DFT): Full-Scan

Lecture 23 Design for Testability (DFT): Full-Scan Lecture 23 Design for Testability (DFT): Full-Scan (Lecture 19alt in the Alternative Sequence) Definition Ad-hoc methods Scan design Design rules Scan register Scan flip-flops Scan test sequences Overheads

More information

System IC Design: Timing Issues and DFT. Hung-Chih Chiang

System IC Design: Timing Issues and DFT. Hung-Chih Chiang System IC esign: Timing Issues and FT Hung-Chih Chiang Outline SoC Timing Issues Timing terminologies Synchronous vs. asynchronous design Interfaces and timing closure Clocking issues Reset esign for Testability

More information

From Theory to Practice: Private Circuit and Its Ambush

From Theory to Practice: Private Circuit and Its Ambush Indian Institute of Technology Kharagpur Telecom ParisTech From Theory to Practice: Private Circuit and Its Ambush Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger and Debdeep Mukhopadhyay

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

EE 447/547 VLSI Design. Lecture 9: Sequential Circuits. VLSI Design EE 447/547 Sequential circuits 1

EE 447/547 VLSI Design. Lecture 9: Sequential Circuits. VLSI Design EE 447/547 Sequential circuits 1 EE 447/547 VLSI esign Lecture 9: Sequential Circuits Sequential circuits 1 Outline Floorplanning Sequencing Sequencing Element esign Max and Min-elay Clock Skew Time Borrowing Two-Phase Clocking Sequential

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

Design for Test. Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective.

Design for Test. Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective. Design for Test Definition: Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective. Types: Design for Testability Enhanced access Built-In

More information

Lecture 11: Sequential Circuit Design

Lecture 11: Sequential Circuit Design Lecture 11: Sequential Circuit esign Outline q Sequencing q Sequencing Element esign q Max and Min-elay q Clock Skew q Time Borrowing q Two-Phase Clocking 2 Sequencing q Combinational logic output depends

More information

A video signal processor for motioncompensated field-rate upconversion in consumer television

A video signal processor for motioncompensated field-rate upconversion in consumer television A video signal processor for motioncompensated field-rate upconversion in consumer television B. De Loore, P. Lippens, P. Eeckhout, H. Huijgen, A. Löning, B. McSweeney, M. Verstraelen, B. Pham, G. de Haan,

More information

Lecture 23 Design for Testability (DFT): Full-Scan (chapter14)

Lecture 23 Design for Testability (DFT): Full-Scan (chapter14) Lecture 23 Design for Testability (DFT): Full-Scan (chapter14) Definition Ad-hoc methods Scan design Design rules Scan register Scan flip-flops Scan test sequences Overheads Scan design system Summary

More information

Based on slides/material by. Topic Testing. Logic Verification. Testing

Based on slides/material by. Topic Testing. Logic Verification. Testing Based on slides/material by Topic 4 K. Masselos http://cas.ee.ic.ac.uk/~kostas J. Rabaey http://bwrc.eecs.berkeley.edu/classes/icbook/instructors.html igital Integrated Circuits: A esign Perspective, Prentice

More information

Glitches/hazards and how to avoid them. What to do when the state machine doesn t fit!

Glitches/hazards and how to avoid them. What to do when the state machine doesn t fit! State Machine Signaling Timing Behavior Glitches/hazards and how to avoid them SM Partitioning What to do when the state machine doesn t fit! State Machine Signaling Introducing Idle States (synchronous

More information

Sequential Circuit Design: Part 1

Sequential Circuit Design: Part 1 Sequential Circuit esign: Part 1 esign of memory elements Static latches Pseudo-static latches ynamic latches Timing parameters Two-phase clocking Clocked inverters James Morizio 1 Sequential Logic FFs

More information

Department of Information Technology and Electrical Engineering. VLSI III: Test and Fabrication of VLSI Circuits L.

Department of Information Technology and Electrical Engineering. VLSI III: Test and Fabrication of VLSI Circuits L. Institut für Integrierte Systeme Integrated Systems Laboratory Department of Information Technology and Electrical Engineering VLSI III: Test and Fabrication of VLSI Circuits 227-0148-00L Exercise 7 Speed

More information

K.T. Tim Cheng 07_dft, v Testability

K.T. Tim Cheng 07_dft, v Testability K.T. Tim Cheng 07_dft, v1.0 1 Testability Is concept that deals with costs associated with testing. Increase testability of a circuit Some test cost is being reduced Test application time Test generation

More information

Overview: Logic BIST

Overview: Logic BIST VLSI Design Verification and Testing Built-In Self-Test (BIST) - 2 Mohammad Tehranipoor Electrical and Computer Engineering University of Connecticut 23 April 2007 1 Overview: Logic BIST Motivation Built-in

More information

CPE/EE 427, CPE 527 VLSI Design I Sequential Circuits. Sequencing

CPE/EE 427, CPE 527 VLSI Design I Sequential Circuits. Sequencing CPE/EE 427, CPE 527 VLSI esign I Sequential Circuits epartment of Electrical and Computer Engineering University of Alabama in Huntsville Aleksandar Milenkovic ( www.ece.uah.edu/~milenka ) Combinational

More information

Sequential Circuit Design: Part 1

Sequential Circuit Design: Part 1 Sequential ircuit esign: Part 1 esign of memory elements Static latches Pseudo-static latches ynamic latches Timing parameters Two-phase clocking locked inverters Krish hakrabarty 1 Sequential Logic FFs

More information

2.6 Reset Design Strategy

2.6 Reset Design Strategy 2.6 Reset esign Strategy Many design issues must be considered before choosing a reset strategy for an ASIC design, such as whether to use synchronous or asynchronous resets, will every flipflop receive

More information

CHAPTER 6 ASYNCHRONOUS QUASI DELAY INSENSITIVE TEMPLATES (QDI) BASED VITERBI DECODER

CHAPTER 6 ASYNCHRONOUS QUASI DELAY INSENSITIVE TEMPLATES (QDI) BASED VITERBI DECODER 80 CHAPTER 6 ASYNCHRONOUS QUASI DELAY INSENSITIVE TEMPLATES (QDI) BASED VITERBI DECODER 6.1 INTRODUCTION Asynchronous designs are increasingly used to counter the disadvantages of synchronous designs.

More information

Design for Testability

Design for Testability TDTS 01 Lecture 9 Design for Testability Zebo Peng Embedded Systems Laboratory IDA, Linköping University Lecture 9 The test problems Fault modeling Design for testability techniques Zebo Peng, IDA, LiTH

More information

Stream Ciphers. Debdeep Mukhopadhyay

Stream Ciphers. Debdeep Mukhopadhyay Stream Ciphers Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -7232 Classifications Objectives Feedback Based Stream

More information

Testability: Lecture 23 Design for Testability (DFT) Slide 1 of 43

Testability: Lecture 23 Design for Testability (DFT) Slide 1 of 43 Testability: Lecture 23 Design for Testability (DFT) Shaahin hi Hessabi Department of Computer Engineering Sharif University of Technology Adapted, with modifications, from lecture notes prepared p by

More information

Outline. EECS150 - Digital Design Lecture 27 - Asynchronous Sequential Circuits. Cross-coupled NOR gates. Asynchronous State Transition Diagram

Outline. EECS150 - Digital Design Lecture 27 - Asynchronous Sequential Circuits. Cross-coupled NOR gates. Asynchronous State Transition Diagram EECS150 - Digital Design Lecture 27 - Asynchronous Sequential Circuits Nov 26, 2002 John Wawrzynek Outline SR Latches and other storage elements Synchronizers Figures from Digital Design, John F. Wakerly

More information

Performance Driven Reliable Link Design for Network on Chips

Performance Driven Reliable Link Design for Network on Chips Performance Driven Reliable Link Design for Network on Chips Rutuparna Tamhankar Srinivasan Murali Prof. Giovanni De Micheli Stanford University Outline Introduction Objective Logic design and implementation

More information

Digital Logic & Computer Design CS Professor Dan Moldovan Spring Chapter 3 :: Sequential Logic Design

Digital Logic & Computer Design CS Professor Dan Moldovan Spring Chapter 3 :: Sequential Logic Design igital Logic & Computer esign CS 4341 Professor an Moldovan Spring 21 Copyright 27 Elsevier 3- Chapter 3 :: Sequential Logic esign igital esign and Computer Architecture avid Money Harris and Sarah

More information

System IC Design: Timing Issues and DFT. Hung-Chih Chiang

System IC Design: Timing Issues and DFT. Hung-Chih Chiang Wireless Information Transmission System Lab. System IC esign: Timing Issues and FT Hung-Chih Chiang Institute of Communications Engineering National Sun Yat-sen University SoC Timing Issues Outline Timing

More information

Introduction to Digital Logic Missouri S&T University CPE 2210 Flip-Flops

Introduction to Digital Logic Missouri S&T University CPE 2210 Flip-Flops Introduction to igital Logic Missouri S&T University CPE 2210 Flip-Flops Egemen K. Çetinkaya Egemen K. Çetinkaya epartment of Electrical & Computer Engineering Missouri University of Science and Technology

More information

Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory. National Central University

Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory. National Central University Chapter 3 Basics of VLSI Testing (2) Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory Department of Electrical Engineering National Central University Jhongli, Taiwan Outline Testing Process Fault

More information

Using on-chip Test Pattern Compression for Full Scan SoC Designs

Using on-chip Test Pattern Compression for Full Scan SoC Designs Using on-chip Test Pattern Compression for Full Scan SoC Designs Helmut Lang Senior Staff Engineer Jens Pfeiffer CAD Engineer Jeff Maguire Principal Staff Engineer Motorola SPS, System-on-a-Chip Design

More information

Asynchronous IC Interconnect Network Design and Implementation Using a Standard ASIC Flow

Asynchronous IC Interconnect Network Design and Implementation Using a Standard ASIC Flow Asynchronous IC Interconnect Network Design and Implementation Using a Standard ASIC Flow Bradley R. Quinton*, Mark R. Greenstreet, Steven J.E. Wilton*, *Dept. of Electrical and Computer Engineering, Dept.

More information

Synchronization in Asynchronously Communicating Digital Systems

Synchronization in Asynchronously Communicating Digital Systems Synchronization in Asynchronously Communicating Digital Systems Priyadharshini Shanmugasundaram Abstract Two digital systems working in different clock domains require a protocol to communicate with each

More information

Report on 4-bit Counter design Report- 1, 2. Report on D- Flipflop. Course project for ECE533

Report on 4-bit Counter design Report- 1, 2. Report on D- Flipflop. Course project for ECE533 Report on 4-bit Counter design Report- 1, 2. Report on D- Flipflop Course project for ECE533 I. Objective: REPORT-I The objective of this project is to design a 4-bit counter and implement it into a chip

More information

Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits

Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits Rajit Karmakar, Student Member, IEEE, Santanu Chattopadhyay, Senior Member, IEEE, and Rohit Kapur, Fellow, IEEE arxiv:8.496v

More information

Measurements of metastability in MUTEX on an FPGA

Measurements of metastability in MUTEX on an FPGA LETTER IEICE Electronics Express, Vol.15, No.1, 1 11 Measurements of metastability in MUTEX on an FPGA Nguyen Van Toan, Dam Minh Tung, and Jeong-Gun Lee a) E-SoC Lab/Smart Computing Lab, Dept. of Computer

More information

Momentary Changes in Outputs. State Machine Signaling. Oscillatory Behavior. Hazards/Glitches. Types of Hazards. Static Hazards

Momentary Changes in Outputs. State Machine Signaling. Oscillatory Behavior. Hazards/Glitches. Types of Hazards. Static Hazards State Machine Signaling Momentary hanges in Outputs Timing ehavior Glitches/hazards and how to avoid them SM Partitioning What to do when the state machine doesn t fit! State Machine Signaling State Machine

More information

LOW POWER AND HIGH PERFORMANCE SHIFT REGISTERS USING PULSED LATCH TECHNIQUE

LOW POWER AND HIGH PERFORMANCE SHIFT REGISTERS USING PULSED LATCH TECHNIQUE OI: 10.21917/ijme.2018.0088 LOW POWER AN HIGH PERFORMANCE SHIFT REGISTERS USING PULSE LATCH TECHNIUE Vandana Niranjan epartment of Electronics and Communication Engineering, Indira Gandhi elhi Technical

More information

VLSI System Testing. BIST Motivation

VLSI System Testing. BIST Motivation ECE 538 VLSI System Testing Krish Chakrabarty Built-In Self-Test (BIST): ECE 538 Krish Chakrabarty BIST Motivation Useful for field test and diagnosis (less expensive than a local automatic test equipment)

More information

A High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability. Nikolaos Minas David Kinniment Keith Heron Gordon Russell

A High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability. Nikolaos Minas David Kinniment Keith Heron Gordon Russell A High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability Nikolaos Minas David Kinniment Keith Heron Gordon Russell Outline of Presentation Introduction Background in Time-to-Digital

More information

Design of Fault Coverage Test Pattern Generator Using LFSR

Design of Fault Coverage Test Pattern Generator Using LFSR Design of Fault Coverage Test Pattern Generator Using LFSR B.Saritha M.Tech Student, Department of ECE, Dhruva Institue of Engineering & Technology. Abstract: A new fault coverage test pattern generator

More information

Sequential Circuit Design: Principle

Sequential Circuit Design: Principle Sequential Circuit Design: Principle modified by L.Aamodt 1 Outline 1. 2. 3. 4. 5. 6. 7. 8. Overview on sequential circuits Synchronous circuits Danger of synthesizing asynchronous circuit Inference of

More information

SoC IC Basics. COE838: Systems on Chip Design

SoC IC Basics. COE838: Systems on Chip Design SoC IC Basics COE838: Systems on Chip Design http://www.ee.ryerson.ca/~courses/coe838/ Dr. Gul N. Khan http://www.ee.ryerson.ca/~gnkhan Electrical and Computer Engineering Ryerson University Overview SoC

More information

UNIT IV CMOS TESTING. EC2354_Unit IV 1

UNIT IV CMOS TESTING. EC2354_Unit IV 1 UNIT IV CMOS TESTING EC2354_Unit IV 1 Outline Testing Logic Verification Silicon Debug Manufacturing Test Fault Models Observability and Controllability Design for Test Scan BIST Boundary Scan EC2354_Unit

More information

EE241 - Spring 2001 Advanced Digital Integrated Circuits. References

EE241 - Spring 2001 Advanced Digital Integrated Circuits. References EE241 - Spring 2001 Advanced Digital Integrated Circuits Lecture 28 References Rabaey, Digital Integrated Circuits and EE241 (1998) notes Chapter 25, ing of High-Performance Processors by D.K. Bhavsar

More information

VLSI Design: 3) Explain the various MOSFET Capacitances & their significance. 4) Draw a CMOS Inverter. Explain its transfer characteristics

VLSI Design: 3) Explain the various MOSFET Capacitances & their significance. 4) Draw a CMOS Inverter. Explain its transfer characteristics 1) Explain why & how a MOSFET works VLSI Design: 2) Draw Vds-Ids curve for a MOSFET. Now, show how this curve changes (a) with increasing Vgs (b) with increasing transistor width (c) considering Channel

More information

At-speed Testing of SOC ICs

At-speed Testing of SOC ICs At-speed Testing of SOC ICs Vlado Vorisek, Thomas Koch, Hermann Fischer Multimedia Design Center, Semiconductor Products Sector Motorola Munich, Germany Abstract This paper discusses the aspects and associated

More information

Metastability Analysis of Synchronizer

Metastability Analysis of Synchronizer Forn International Journal of Scientific Research in Computer Science and Engineering Research Paper Vol-1, Issue-3 ISSN: 2320 7639 Metastability Analysis of Synchronizer Ankush S. Patharkar *1 and V.

More information

An Asynchronous Fully Digital DLL for DDR SDRAM Data Recovery

An Asynchronous Fully Digital DLL for DDR SDRAM Data Recovery An Asynchronous Fully Digital DLL for DDR SDRAM Data Recovery Jim Garside et al. University The problem Contents Why asynchronous Some asynchronous bits and pieces Dynamic switching and glitches Overall

More information

LFSR Counter Implementation in CMOS VLSI

LFSR Counter Implementation in CMOS VLSI LFSR Counter Implementation in CMOS VLSI Doshi N. A., Dhobale S. B., and Kakade S. R. Abstract As chip manufacturing technology is suddenly on the threshold of major evaluation, which shrinks chip in size

More information

for Digital IC's Design-for-Test and Embedded Core Systems Alfred L. Crouch Prentice Hall PTR Upper Saddle River, NJ

for Digital IC's Design-for-Test and Embedded Core Systems Alfred L. Crouch Prentice Hall PTR Upper Saddle River, NJ Design-for-Test for Digital IC's and Embedded Core Systems Alfred L. Crouch Prentice Hall PTR Upper Saddle River, NJ 07458 www.phptr.com ISBN D-13-DflMfla7-l : Ml H Contents Preface Acknowledgments Introduction

More information

A Low-power Pipelined Implementation of 2D Discrete Wavelet Transform

A Low-power Pipelined Implementation of 2D Discrete Wavelet Transform A Low-power Pipelined Implementation of iscrete Wavelet Transform Yong Liu¹, Edmund M-K. Lai¹, A.B. Premkumar¹ and amu Radhakrishnan² ¹School of Computer Engineering, Nanyang Technological University,

More information

Efficient Architecture for Flexible Prescaler Using Multimodulo Prescaler

Efficient Architecture for Flexible Prescaler Using Multimodulo Prescaler Efficient Architecture for Flexible Using Multimodulo G SWETHA, S YUVARAJ Abstract This paper, An Efficient Architecture for Flexible Using Multimodulo is an architecture which is designed from the proposed

More information

11. Sequential Elements

11. Sequential Elements 11. Sequential Elements Jacob Abraham Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017 October 11, 2017 ECE Department, University of Texas at Austin

More information

Co-simulation Techniques for Mixed Signal Circuits

Co-simulation Techniques for Mixed Signal Circuits Co-simulation Techniques for Mixed Signal Circuits Tudor Timisescu Technische Universität München Abstract As designs grow more and more complex, there is increasing effort spent on verification. Most

More information

VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits

VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits N.Brindha, A.Kaleel Rahuman ABSTRACT: Auto scan, a design for testability (DFT) technique for synchronous sequential circuits.

More information

Synchronous Digital Logic Systems. Review of Digital Logic. Philosophy. Combinational Logic. A Full Adder. Combinational Logic

Synchronous Digital Logic Systems. Review of Digital Logic. Philosophy. Combinational Logic. A Full Adder. Combinational Logic Synchronous igital Logic Systems Review of igital Logic Prof. Stephen. Edwards Raw materials: MOS transistors and wires on Is Wires are excellent conveyors of voltage Little leakage Fast, but not instantaneous

More information

Laboratory 4. Figure 1: Serdes Transceiver

Laboratory 4. Figure 1: Serdes Transceiver Laboratory 4 The purpose of this laboratory exercise is to design a digital Serdes In the first part of the lab, you will design all the required subblocks for the digital Serdes and simulate them In part

More information

A Novel Low-overhead Delay Testing Technique for Arbitrary Two-Pattern Test Application

A Novel Low-overhead Delay Testing Technique for Arbitrary Two-Pattern Test Application A Novel Low-overhead elay Testing Technique for Arbitrary Two-Pattern Test Application Swarup Bhunia, Hamid Mahmoodi, Arijit Raychowdhury, and Kaushik Roy School of Electrical and Computer Engineering,

More information

EECS150 - Digital Design Lecture 10 - Interfacing. Recap and Topics

EECS150 - Digital Design Lecture 10 - Interfacing. Recap and Topics EECS150 - Digital Design Lecture 10 - Interfacing Oct. 1, 2013 Prof. Ronald Fearing Electrical Engineering and Computer Sciences University of California, Berkeley (slides courtesy of Prof. John Wawrzynek)

More information

Design and Simulation of a Digital CMOS Synchronous 4-bit Up-Counter with Set and Reset

Design and Simulation of a Digital CMOS Synchronous 4-bit Up-Counter with Set and Reset Design and Simulation of a Digital CMOS Synchronous 4-bit Up-Counter with Set and Reset Course Number: ECE 533 Spring 2013 University of Tennessee Knoxville Instructor: Dr. Syed Kamrul Islam Prepared by

More information

Level and edge-sensitive behaviour

Level and edge-sensitive behaviour Level and edge-sensitive behaviour Asynchronous set/reset is level-sensitive Include set/reset in sensitivity list Put level-sensitive behaviour first: process (clock, reset) is begin if reset = '0' then

More information

Electrical & Computer Engineering ECE 491. Introduction to VLSI. Report 1

Electrical & Computer Engineering ECE 491. Introduction to VLSI. Report 1 Electrical & Computer Engineering ECE 491 Introduction to VLSI Report 1 Marva` Morrow INTRODUCTION Flip-flops are synchronous bistable devices (multivibrator) that operate as memory elements. A bistable

More information

Sequences and Cryptography

Sequences and Cryptography Sequences and Cryptography Workshop on Shift Register Sequences Honoring Dr. Solomon W. Golomb Recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering Guang Gong Department of Electrical

More information

A Symmetric Differential Clock Generator for Bit-Serial Hardware

A Symmetric Differential Clock Generator for Bit-Serial Hardware A Symmetric Differential Clock Generator for Bit-Serial Hardware Mitchell J. Myjak and José G. Delgado-Frias School of Electrical Engineering and Computer Science Washington State University Pullman, WA,

More information

PICOSECOND TIMING USING FAST ANALOG SAMPLING

PICOSECOND TIMING USING FAST ANALOG SAMPLING PICOSECOND TIMING USING FAST ANALOG SAMPLING H. Frisch, J-F Genat, F. Tang, EFI Chicago, Tuesday 6 th Nov 2007 INTRODUCTION In the context of picosecond timing, analog detector pulse sampling in the 10

More information

Chapter 5 Flip-Flops and Related Devices

Chapter 5 Flip-Flops and Related Devices Chapter 5 Flip-Flops and Related Devices Chapter 5 Objectives Selected areas covered in this chapter: Constructing/analyzing operation of latch flip-flops made from NAND or NOR gates. Differences of synchronous/asynchronous

More information

A CHARGE RECYCLING THREE-PHASE DUAL-RAIL PRE-CHARGE LOGIC BASED FLIP-FLOP

A CHARGE RECYCLING THREE-PHASE DUAL-RAIL PRE-CHARGE LOGIC BASED FLIP-FLOP A CHARGE RECYCLING THREE-PHASE DUAL-RAIL PRE-CHARGE LOGIC BASED FLIP-FLOP Kothagudem Mounika, S. Rajendar, R. Naresh Department of Electronics and Communication Engineering, Vardhaman College of Engineering,

More information

Figure 1 shows a simple implementation of a clock switch, using an AND-OR type multiplexer logic.

Figure 1 shows a simple implementation of a clock switch, using an AND-OR type multiplexer logic. 1. CLOCK MUXING: With more and more multi-frequency clocks being used in today's chips, especially in the communications field, it is often necessary to switch the source of a clock line while the chip

More information

Bit Swapping LFSR and its Application to Fault Detection and Diagnosis Using FPGA

Bit Swapping LFSR and its Application to Fault Detection and Diagnosis Using FPGA Bit Swapping LFSR and its Application to Fault Detection and Diagnosis Using FPGA M.V.M.Lahari 1, M.Mani Kumari 2 1,2 Department of ECE, GVPCEOW,Visakhapatnam. Abstract The increasing growth of sub-micron

More information

EEC 116 Fall 2011 Lab #5: Pipelined 32b Adder

EEC 116 Fall 2011 Lab #5: Pipelined 32b Adder EEC 116 Fall 2011 Lab #5: Pipelined 32b Adder Dept. of Electrical and Computer Engineering University of California, Davis Issued: November 2, 2011 Due: November 16, 2011, 4PM Reading: Rabaey Sections

More information

Logic Design ( Part 3) Sequential Logic- Finite State Machines (Chapter 3)

Logic Design ( Part 3) Sequential Logic- Finite State Machines (Chapter 3) Logic esign ( Part ) Sequential Logic- Finite State Machines (Chapter ) Based on slides McGraw-Hill Additional material 00/00/006 Lewis/Martin Additional material 008 Roth Additional material 00 Taylor

More information

A Novel Asynchronous ADC Architecture

A Novel Asynchronous ADC Architecture A Novel Asynchronous ADC Architecture George Robert Harris III and Taskin Kocak School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 3286-2450 tkocak@cpeucfedu

More information

Chapter 8 Design for Testability

Chapter 8 Design for Testability 電機系 Chapter 8 Design for Testability 測試導向設計技術 2 Outline Introduction Ad-Hoc Approaches Full Scan Partial Scan 3 Design For Testability Definition Design For Testability (DFT) refers to those design techniques

More information

Low Power VLSI CMOS Design An Image Processing Chip for RGB to HSI Conversion

Low Power VLSI CMOS Design An Image Processing Chip for RGB to HSI Conversion Low Power VLSI CMOS Design An Image Processing Chip for RGB to HSI Conversion A.Th. Schwarzbacher 1,2 and J.B. Foley 2 1 Dublin Institute of Technology, Dept. Of Electronic and Communication Eng., Dublin,

More information

ASNT8140. ASNT8140-KMC DC-23Gbps PRBS Generator with the (x 7 + x + 1) Polynomial. vee. vcc qp. vcc. vcc qn. qxorp. qxorn. vee. vcc rstn_p.

ASNT8140. ASNT8140-KMC DC-23Gbps PRBS Generator with the (x 7 + x + 1) Polynomial. vee. vcc qp. vcc. vcc qn. qxorp. qxorn. vee. vcc rstn_p. ASNT8140-KMC DC-23Gbps PRBS Generator with the (x 7 + x + 1) Polynomial Full-length (2 7-1) pseudo-random binary sequence (PRBS) generator DC to 23Gbps output data rate Additional output delayed by half

More information

data and is used in digital networks and storage devices. CRC s are easy to implement in binary

data and is used in digital networks and storage devices. CRC s are easy to implement in binary Introduction Cyclic redundancy check (CRC) is an error detecting code designed to detect changes in transmitted data and is used in digital networks and storage devices. CRC s are easy to implement in

More information

FPGA Development for Radar, Radio-Astronomy and Communications

FPGA Development for Radar, Radio-Astronomy and Communications John-Philip Taylor Room 7.03, Department of Electrical Engineering, Menzies Building, University of Cape Town Cape Town, South Africa 7701 Tel: +27 82 354 6741 email: tyljoh010@myuct.ac.za Internet: http://www.uct.ac.za

More information

VARIABLE FREQUENCY CLOCKING HARDWARE

VARIABLE FREQUENCY CLOCKING HARDWARE VARIABLE FREQUENCY CLOCKING HARDWARE Variable-Frequency Clocking Hardware Many complex digital systems have components clocked at different frequencies Reason 1: to reduce power dissipation The active

More information

ASNT8142-KMC Generator of DC-to-23Gbps PRBS with Selectable Polynomials

ASNT8142-KMC Generator of DC-to-23Gbps PRBS with Selectable Polynomials ASNT8142-KMC Generator of DC-to-23Gbps PRBS with Selectable Polynomials Full-length (2 15-1) or (2 7-1) pseudo-random binary sequence (PRBS) generator Selectable power of the Polynomial DC to 23Gbps output

More information

Single Channel LVDS Tx

Single Channel LVDS Tx April 2013 Introduction Reference esign R1162 Low Voltage ifferential Signaling (LVS) is an electrical signaling system that can run at very high speeds over inexpensive twisted-pair copper cables. It

More information

Project 6: Latches and flip-flops

Project 6: Latches and flip-flops Project 6: Latches and flip-flops Yuan Ze University epartment of Computer Engineering and Science Copyright by Rung-Bin Lin, 1999 All rights reserved ate out: 06/5/2003 ate due: 06/25/2003 Purpose: This

More information

Introduction. NAND Gate Latch. Digital Logic Design 1 FLIP-FLOP. Digital Logic Design 1

Introduction. NAND Gate Latch.  Digital Logic Design 1 FLIP-FLOP. Digital Logic Design 1 2007 Introduction BK TP.HCM FLIP-FLOP So far we have seen Combinational Logic The output(s) depends only on the current values of the input variables Here we will look at Sequential Logic circuits The

More information

EL302 DIGITAL INTEGRATED CIRCUITS LAB #3 CMOS EDGE TRIGGERED D FLIP-FLOP. Due İLKER KALYONCU, 10043

EL302 DIGITAL INTEGRATED CIRCUITS LAB #3 CMOS EDGE TRIGGERED D FLIP-FLOP. Due İLKER KALYONCU, 10043 EL302 DIGITAL INTEGRATED CIRCUITS LAB #3 CMOS EDGE TRIGGERED D FLIP-FLOP Due 16.05. İLKER KALYONCU, 10043 1. INTRODUCTION: In this project we are going to design a CMOS positive edge triggered master-slave

More information

Design for Testability Part II

Design for Testability Part II Design for Testability Part II 1 Partial-Scan Definition A subset of flip-flops is scanned. Objectives: Minimize area overhead and scan sequence length, yet achieve required fault coverage. Exclude selected

More information

VLSI Based Minimized Composite S-Box and Inverse Mix Column for AES Encryption and Decryption

VLSI Based Minimized Composite S-Box and Inverse Mix Column for AES Encryption and Decryption VLSI Based Minimized Composite S-Bo and Inverse Mi Column for AES Encryption and Decryption 1 J. Balamurugan, 2 Dr. E. Logashanmugam 1 Research scholar, 2 Professor and Head, 1 St. Peter s University,

More information

Instructions. Final Exam CPSC/ELEN 680 December 12, Name: UIN:

Instructions. Final Exam CPSC/ELEN 680 December 12, Name: UIN: Final Exam CPSC/ELEN 680 December 12, 2005 Name: UIN: Instructions This exam is closed book. Provide brief but complete answers to the following questions in the space provided, using figures as necessary.

More information

VirtualScan TM An Application Story

VirtualScan TM An Application Story Test Data Compaction Tool from SynTest TM VirtualScan TM An Application Story January 29, 2004 Hiroshi Furukawa SoC No. 3 Group, SoC Development Division 1 Agenda Current Problems What is VirtualScan?

More information

DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR

DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR International Journal of Computer Science and Applications, Vol. 6, No, 4, pp 43-62, 29 Technomathematics Research Foundation DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA

More information

Diagnosis of Resistive open Fault using Scan Based Techniques

Diagnosis of Resistive open Fault using Scan Based Techniques Diagnosis of Resistive open Fault using Scan Based Techniques 1 Mr. A. Muthu Krishnan. M.E., (Ph.D), 2. G. Chandra Theepa Assistant Professor 1, PG Scholar 2,Dept. of ECE, Regional Office, Anna University,

More information

Testing Digital Systems II

Testing Digital Systems II Testing Digital Systems II Lecture 5: Built-in Self Test (I) Instructor: M. Tahoori Copyright 2010, M. Tahoori TDS II: Lecture 5 1 Outline Introduction (Lecture 5) Test Pattern Generation (Lecture 5) Pseudo-Random

More information

CHAPTER 6 DESIGN OF HIGH SPEED COUNTER USING PIPELINING

CHAPTER 6 DESIGN OF HIGH SPEED COUNTER USING PIPELINING 149 CHAPTER 6 DESIGN OF HIGH SPEED COUNTER USING PIPELINING 6.1 INTRODUCTION Counters act as important building blocks of fast arithmetic circuits used for frequency division, shifting operation, digital

More information

EITF35: Introduction to Structured VLSI Design

EITF35: Introduction to Structured VLSI Design EITF35: Introduction to Structured VLSI Design Part 4.2.1: Learn More Liang Liu liang.liu@eit.lth.se 1 Outline Crossing clock domain Reset, synchronous or asynchronous? 2 Why two DFFs? 3 Crossing clock

More information

Logic Analysis Basics

Logic Analysis Basics Logic Analysis Basics September 27, 2006 presented by: Alex Dickson Copyright 2003 Agilent Technologies, Inc. Introduction If you have ever asked yourself these questions: What is a logic analyzer? What

More information

VLSI Test Technology and Reliability (ET4076)

VLSI Test Technology and Reliability (ET4076) VLSI Test Technology and Reliability (ET476) Lecture 9 (2) Built-In-Self Test (Chapter 5) Said Hamdioui Computer Engineering Lab Delft University of Technology 29-2 Learning aims Describe the concept and

More information