GALS System Design. Side Channel Attack Secure Cryptographic Accelerators. Frank K. Gürkaynak. Integrated Systems Laboratory ETH Zurich
|
|
- Aubrie Daniel
- 5 years ago
- Views:
Transcription
1 GLS System esign Side Channel ttack Secure Cryptographic ccelerators Frank K. Gürkaynak Integrated Systems Laboratory ETH Zurich 22 November 2005 Ph.. Thesis Presentation
2 Intro GLS Crypto cacia Results G C R KGF Contents Motivation Outline 1 Outline 2 Globally-synchronous Locally-Synchronous (GLS) esign 3 Cryptography 4 GLS implementation of the ES lgorithm 5 Results and Conclusions GLS System esign kgf, Integrated Systems Laboratory (IIS) 2 / 48
3 Intro GLS Crypto cacia Results G C R KGF Contents Motivation What is wrong with the way we design chips now? Modern System-on-Chip circuits... Contain millions of transistors Require clock rates exceeding 100s of MHz Include 100s of subblocks Use 10s of different clock domains GLS System esign kgf, Integrated Systems Laboratory (IIS) 3 / 48
4 Intro GLS Crypto cacia Results G C R KGF Contents Motivation What is wrong with the way we design chips now? Modern System-on-Chip circuits... Contain millions of transistors, trend increasing Require clock rates exceeding 100s of MHz, trend increasing Include 100s of subblocks, trend increasing Use 10s of different clock domains, trend increasing GLS System esign kgf, Integrated Systems Laboratory (IIS) 3 / 48
5 Intro GLS Crypto cacia Results G C R KGF Contents Motivation What is wrong with the way we design chips now? Modern System-on-Chip circuits... Contain millions of transistors, trend increasing Require clock rates exceeding 100s of MHz, trend increasing Include 100s of subblocks, trend increasing Use 10s of different clock domains, trend increasing... are not easy to design The clock signal must be distributed to an increasing number of elements with increased precision Many independently designed components must be combined to a large system. ll subsystems must be able to reliably exchange data GLS System esign kgf, Integrated Systems Laboratory (IIS) 3 / 48
6 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Globally-synchronous Locally-Synchronous esign GLS is a methodology to enable the design of complex digital systems on chip. System is divided into smaller GLS modules Each module works synchronously Interconnected modules communicate asynchronously GLS System esign kgf, Integrated Systems Laboratory (IIS) 4 / 48
7 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Globally-synchronous Locally-Synchronous esign GLS is a methodology to enable the design of complex digital systems on chip. System is divided into smaller GLS modules Each module works synchronously Interconnected modules communicate asynchronously Was first developed by. Chapiro in 1984 First chip implementation by J. Muttersbach in 1999 GLS System esign kgf, Integrated Systems Laboratory (IIS) 4 / 48
8 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Globally-synchronous Locally-Synchronous esign GLS is a methodology to enable the design of complex digital systems on chip. System is divided into smaller GLS modules Each module works synchronously Interconnected modules communicate asynchronously Was first developed by. Chapiro in 1984 First chip implementation by J. Muttersbach in 1999 GLS implementations differ in: synchronization method between blocks specific asynchronous communication protocol used GLS System esign kgf, Integrated Systems Laboratory (IIS) 4 / 48
9 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Basic GLS Structure ata Synchronous Block Synchronous Block B Clk Clk Synchronous system Two large functional blocks of a synchronous system GLS System esign kgf, Integrated Systems Laboratory (IIS) 5 / 48
10 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Basic GLS Structure GLS Module GLS Module B Locally Synchronous Island ataout atain Locally Synchronous Island B Lclk Lclk Local Clock Generator Local Clock Generator Local clock generators GLS modules are formed by adding a local clock generator for each functional block GLS System esign kgf, Integrated Systems Laboratory (IIS) 5 / 48
11 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Basic GLS Structure GLS Module GLS Module B Locally Synchronous Island Pen Ta ataout Port Req ck atain Port Pen Ta Locally Synchronous Island B Lclk Local Clock Generator Ri i Ri i Lclk Local Clock Generator GLS system Port controllers are added to regulate data transfers between GLS modules GLS System esign kgf, Integrated Systems Laboratory (IIS) 5 / 48
12 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages GLS Works GLS at IIS J. Muttersbach First implementation T. Villiger S. Oetiker F. K. Gürkaynak GLS System esign kgf, Integrated Systems Laboratory (IIS) 6 / 48
13 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages GLS Works GLS at IIS J. Muttersbach T. Villiger Multi-point interconnect S. Oetiker F. K. Gürkaynak GLS System esign kgf, Integrated Systems Laboratory (IIS) 6 / 48
14 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages GLS Works GLS at IIS J. Muttersbach T. Villiger S. Oetiker Local clock generators F. K. Gürkaynak GLS System esign kgf, Integrated Systems Laboratory (IIS) 6 / 48
15 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages GLS Works GLS at IIS J. Muttersbach T. Villiger S. Oetiker F. K. Gürkaynak esign and test flow GLS System esign kgf, Integrated Systems Laboratory (IIS) 6 / 48
16 Intro GLS Crypto cacia Results G C R KGF Overview Structure GLS@IIS dvantages Why GLS? dvantages No global clock distribution problems Modular design flow Potential for low-power design Offers new possibilities for designers GLS System esign kgf, Integrated Systems Laboratory (IIS) 7 / 48
17 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P Cryptography 101 LICE OSCR BOB Plain-text Encryption Cipher-text ecryption Plain-text Cipher-key Cipher-key Private key ciphers lice encrypts plain-text information by using a cipher-key. Bob can decrypt the resulting cipher-text only if he has access to the same cipher-key. GLS System esign kgf, Integrated Systems Laboratory (IIS) 8 / 48
18 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P Cryptography 102 LICE OSCR BOB Plain-text Encryption Cipher-text ecryption Plain-text Cipher-key Cipher-key Security Oscar wishes to obtain the plain-text Oscar knows everything about the cryptographic algorithm Oscar can observe/modify the cipher-text but.. GLS System esign kgf, Integrated Systems Laboratory (IIS) 9 / 48
19 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P Cryptography 102 LICE OSCR BOB Plain-text Encryption Cipher-text ecryption Plain-text Cipher-key Cipher-key Security Oscar wishes to obtain the plain-text Oscar knows everything about the cryptographic algorithm Oscar can observe/modify the cipher-text but.. Oscar does not know the cipher-key GLS System esign kgf, Integrated Systems Laboratory (IIS) 9 / 48
20 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P dvanced Encryption Standard (ES) Plaintext RoundKey ES Standard by NIST bit data 128 bit key 10/12/14 rounds Components ShiftRows State Register S00 S10 S20 S30 S01 S11 S21 S31 S02 S12 S22 S32 S03 S13 S23 S33 ShiftRows ddroundkey SubBytes MixColumns X X X X X X X X X X X X X X X X Ciphertext GLS System esign kgf, Integrated Systems Laboratory (IIS) 10 / 48
21 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P dvanced Encryption Standard (ES) Plaintext RoundKey ES Standard by NIST bit data 128 bit key 10/12/14 rounds Components ShiftRows ddroundkey State Register S00 S10 S20 S30 S01 S11 S21 S31 S02 S12 S22 S32 S03 S13 S23 S33 ShiftRows ddroundkey SubBytes MixColumns X X X X X X X X X X X X X X X X Ciphertext GLS System esign kgf, Integrated Systems Laboratory (IIS) 10 / 48
22 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P dvanced Encryption Standard (ES) Plaintext RoundKey ES Standard by NIST bit data 128 bit key 10/12/14 rounds Components ShiftRows ddroundkey SubBytes State Register S00 S10 S20 S30 S01 S11 S21 S31 S02 S12 S22 S32 S03 S13 S23 S33 ShiftRows ddroundkey SubBytes MixColumns X X X X X X X X X X X X X X X X Ciphertext GLS System esign kgf, Integrated Systems Laboratory (IIS) 10 / 48
23 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P dvanced Encryption Standard (ES) Plaintext RoundKey ES Standard by NIST bit data 128 bit key 10/12/14 rounds Components ShiftRows ddroundkey SubBytes MixColumns State Register S00 S10 S20 S30 S01 S11 S21 S31 S02 S12 S22 S32 S03 S13 S23 S33 ShiftRows ddroundkey SubBytes MixColumns X X X X X X X X X X X X X X X X Ciphertext GLS System esign kgf, Integrated Systems Laboratory (IIS) 10 / 48
24 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P Side-Channels Once an otherwise secure algorithm is implemented in either Hardware or Software it gains physical properties that can be observed: Time required to finish the operation Power consumption Electromagnetic Radiation Heat dissipation Sound These properties are called Side Channels Side-Channel ttacks In 1996, P. Kocher showed that it is possible to obtain additional information on the cipher-key by observing these side-channels. GLS System esign kgf, Integrated Systems Laboratory (IIS) 11 / 48
25 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P ifferential Power nalysis (P) 1 Select a subkey and a target operation 2 Use a simple model to predict the power consumption for S input vectors Cryptographic Hardware Under ttack Measurement S input vectors Simple Power Model of Cryptographic Hardware P 0 P 1 P 2 S vectors H 0,0 H 1,0 H 0,1 H 1,1 H 0,2 H 1,2 H K,0 H K,1 H K,2 P S H 0,S H 1,S H K,S Statistical Evaluation of Model and Measurement GLS System esign kgf, Integrated Systems Laboratory (IIS) 12 / 48
26 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P ifferential Power nalysis (P) 1 Select a subkey and a target operation 2 Use a simple model to predict the power consumption for S input vectors 3 predict the power consumption for all K subkey permutations Cryptographic Hardware Under ttack Measurement P 0 P 1 P 2 S input vectors S vectors Simple Power Model of Cryptographic Hardware K subkeys H 0,0 H 0,1 H 0,2 H 1,0 H 1,1 H 1,2 H K,0 H K,1 H K,2 P S H 0,S H 1,S H K,S Statistical Evaluation of Model and Measurement GLS System esign kgf, Integrated Systems Laboratory (IIS) 12 / 48
27 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P ifferential Power nalysis (P) 1 Select a subkey and a target operation 2 Use a simple model to predict the power consumption for S input vectors 3 predict the power consumption for all K subkey permutations 4 Measure the power consumption using the same S input vectors Cryptographic Hardware Under ttack Side Channel Information Measurement S vectors P 0 P 1 P 2 P S S input vectors Simple Power Model of Cryptographic Hardware H 0,0 H 0,1 H 0,2 H 0,S H 1,0 H 1,1 H 1,2 H 1,S H K,0 H K,1 H K,2 H K,S Statistical Evaluation of Model and Measurement GLS System esign kgf, Integrated Systems Laboratory (IIS) 12 / 48
28 Intro GLS Crypto cacia Results G C R KGF Basics Security ES Side-Channel ttacks P ifferential Power nalysis (P) 1 Select a subkey and a target operation 2 Use a simple model to predict the power consumption for S input vectors 3 predict the power consumption for all K subkey permutations 4 Measure the power consumption using the same S input vectors 5 etermine if one of the power hypotheses shows a distinctively higher correlation to the measurement. Cryptographic Hardware Under ttack Measurement S vectors S input vectors S vectors Statistical Evaluation of Model and Measurement Simple Power Model of Cryptographic Hardware K subkeys GLS System esign kgf, Integrated Systems Laboratory (IIS) 12 / 48 P 0 P 1 P 2 P S? H 0,0 H 0,1 H 0,2 H 0,S H 1,0 H 1,1 H 1,2 H 1,S H K,0 H K,1 H K,2 H K,S
29 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock CCI Clock Handshake ata 16 Block iagram The GLS implementation is called cacia. Operations are divided between a 128-bit Goliath and a 32-bit avid unit GOLITH Key Generator Round Key Memory INTERFCE bit Reg ddroundkey ShiftRows 32 VI 32-bit Reg SubBytes MixColumns GLS System esign kgf, Integrated Systems Laboratory (IIS) 13 / 48
30 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock CCI Clock Handshake ata 16 Block iagram The GLS implementation is called cacia. Operations are divided between a 128-bit Goliath and a 32-bit avid unit avid and Goliath are separate GLS modules GOLITH_GLS GOLITH Key Generator Round Key Memory INTERFCE 128 g2s 128-bit Reg ddroundkey ShiftRows Local Clock Generator g2d 32 VI_GLS d2g VI 32-bit Reg SubBytes MixColumns Local Clock Generator GLS System esign kgf, Integrated Systems Laboratory (IIS) 13 / 48
31 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Block iagram The GLS implementation is called cacia. Operations are divided between a 128-bit Goliath and a 32-bit avid unit avid and Goliath are separate GLS modules There is a second avid unit running in parallel. One round of ES requires 1 Goliath and 4 avid operations. CCI Clock Handshake ata 16 GOLITH_GLS Local Clock Generator GOLITH g2d d2g Key Generator Round Key Memory 32 VI_GLS 32-bit Reg SubBytes MixColumns VI Local Clock Generator g2s VI 128 VI_GLS INTERFCE 128-bit Reg ddroundkey ShiftRows 32-bit Reg SubBytes 32 MixColumns g2d d2g Local Clock Generator GLS System esign kgf, Integrated Systems Laboratory (IIS) 13 / 48
32 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ddkey / ShiftR S01 S02 S03 S04 MixC 1 S05 S06 S07 S08 MixC 2 S09 S10 S11 S12 MixC 3 S13 S14 S15 S16 MixC 4 Normal Operation The attacker will normally target a single operation, and will measure the power consumption of this particular clock cycle. GLS System esign kgf, Integrated Systems Laboratory (IIS) 14 / 48
33 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented countermeasures ummy Oper. ummy Oper. ddkey / ShiftR S01 S02 S03 S04 S05 S06 S07 S08 S09 S10 S11 S12 S13 S14 S15 S16 ummy MixC 1 ummy ummy MixC 2 MixC 3 MixC 4 Inserting dummy operations Inserting random dummy cycles will confuse the attacker, since the targeted operation will not always be executed at a specific clock cycle. Unfortunately, this also increases the run-time. GLS System esign kgf, Integrated Systems Laboratory (IIS) 15 / 48
34 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ummy Oper. ummy Oper. ddkey / ShiftR S06 S08 S07 S05 S16 S14 S15 S13 S04 S02 S03 S01 S12 S10 S09 S11 ummy ummy MixC 2 MixC 4 ummy MixC 1 MixC 3 Change ordering of operations Independent operations can be re-ordered arbitrarily. Contrary to inserting dummy cycles, this does not increase the run-time. GLS System esign kgf, Integrated Systems Laboratory (IIS) 16 / 48
35 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ummy Oper. ummy Oper. ddkey / ShiftR S06 S16 S08 S07 S05 S14 S15 S13 ummy ummy MixC 2 MixC 4 S04 S02 S03 S01 S12 S10 S09 S11 MixC 3 ummy MixC 1 Parallelization Executing operations in parallel creates more activity at the same time, this appears as noise for the attacker. GLS System esign kgf, Integrated Systems Laboratory (IIS) 17 / 48
36 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ummy Oper. ummy Oper. ddkey / ShiftR S06 S08 S07 S05 S16 S14 S13 S15 ummy ummy MixC 2 MixC 4 S12 S09 S10 S11 S02 S03 S04 S01 MixC 3 ummy MixC 1 Parallelization Executing operations in parallel creates more activity at the same time, this appears as noise for the attacker. GLS System esign kgf, Integrated Systems Laboratory (IIS) 17 / 48
37 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures ummy ummy ummy ummy Oper. ummy Oper. ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ddkey / ShiftR ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. S06 S08 S02 S03 S07 S05 S04 S01 MixC 4 MixC 3 MixC 2 MixC 1 S16 S14 S13 S12 S09 S15 S10 S11 Parallelization Executing operations in parallel creates more activity at the same time, this appears as noise for the attacker. GLS System esign kgf, Integrated Systems Laboratory (IIS) 17 / 48
38 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures Goliath ummy ummy ummy ummy Oper. ummy Oper. ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ddkey / ShiftR ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. S06 S08 S02 S03 S07 S05 S04 S01 MixC 4 MixC 3 MixC 2 MixC 1 ummy Oper. avid Perels avid Tschopp S16 S14 S13 S12 S09 S15 S10 S11 Introducing GLS modules GLS modules have their own local clock generator, their clocks are independent and can not be controlled by the attacker GLS System esign kgf, Integrated Systems Laboratory (IIS) 18 / 48
39 Intro GLS Crypto cacia Results G C R KGF Block Basic ummy Re-order Parallel GLS Variable Clock Implemented Countermeasures Goliath ummy ummy ummy ummy Oper. ummy Oper. ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ummy ddkey / ShiftR ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. ummy Oper. S06 S08 S02 S03 S07 S05 S04 S01 MixC 4 MixC 3 MixC 2 MixC 1 ummy Oper. avid Perels avid Tschopp ummy S16 S14 S13 S12 S09 S15 S10 S11 Variable clock periods Each GLS module can randomly change its own clock period. This adds even more uncertainity GLS System esign kgf, Integrated Systems Laboratory (IIS) 19 / 48
40 Intro GLS Crypto cacia Results G C R KGF Chip Conclusions Final Chip Photo cacia UMC 0.25 µm CMOS Total area 1.75 mm 2 avid mm 2 Goliath mm 2 Sync mm 2 Rate Mb/s Energy mj/mb This part of the chip occupied by two independent ES designs: Baby and Pampers Synchronous Interface & Reference esign Clockgen Clockgen avid g2s Goliath d2g g2d d2g g2d Clockgen avid GLS System esign kgf, Integrated Systems Laboratory (IIS) 20 / 48
41 Intro GLS Crypto cacia Results G C R KGF Chip Conclusions Final Conclusions Conclusions novel GLS based crypto SIC implementing the ES algorithm was presented. In addition to traditional P countermeasures, the chip also includes GLS modules that use randomly varying clocks which make known attacks extremely difficult The GLS design methodology was refined. The presented design was designed using mainly standard E tools. combination of functional and scan-chain based testing allows a stuck-at-coverage of more than 99.8%. GLS System esign kgf, Integrated Systems Laboratory (IIS) 21 / 48
42 Intro GLS Crypto cacia Results G C R KGF Chip Conclusions Final Conclusions Conclusions novel GLS based crypto SIC implementing the ES algorithm was presented. In addition to traditional P countermeasures, the chip also includes GLS modules that use randomly varying clocks which make known attacks extremely difficult The GLS design methodology was refined. The presented design was designed using mainly standard E tools. combination of functional and scan-chain based testing allows a stuck-at-coverage of more than 99.8%. Is this really secure? We don t know yet. The security has to be evaluated by cryptanalysts. GLS System esign kgf, Integrated Systems Laboratory (IIS) 21 / 48
43 Intro GLS Crypto cacia Results G C R KGF Chip Conclusions Final QUESTIONS? cknowledgements for GLS Stephan Oetiker, Thomas Villiger, Hubert Kaeslin, Norbert Felber cknowledgements for Crypto-chips Stefan chleitner, Gérard Basler, ndres Erni, ominique Gasser, Peter Haldi, Franco Hug, drian Lutz, Norbert Pramstaller, Stefan Reichmuth, Pieter Rommens, Jürg Treichler, Stefan Zwicky and ndreas Burg, Matthias Braendli, Stefan Eberli, Simon Haene Stefan Mangard, Elisabeth Oswald, S. Berna Örs GLS System esign kgf, Integrated Systems Laboratory (IIS) 22 / 48
44 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Receiving GLS Module Req ck Local Clock Generator Ri i 1 GLS port is activated by the Pen signal, which enables Req GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48
45 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Receiving GLS Module Req ck Local Clock Generator Ri i 2 The receiving GLS module sets ck, clock pause request Ri is set GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48
46 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Receiving GLS Module Req ck Local Clock Generator Ri i 3 The clock pause is acknowledged by i, the LS Island is paused GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48
47 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Local clock is paused Receiving GLS Module Req ck Local Clock Generator Ri i 4 ata transfer is complete, Ta is set and Req is reset GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48
48 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Local clock is paused Receiving GLS Module Req ck Local Clock Generator Ri i 5 ll handshake signals return to their initial values, local clock is released GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48
49 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Timing iagram Locally Synchronous Island Clock Pen Ta Local clock is paused Receiving GLS Module Req ck Local Clock Generator Ri i 6 Normal operation resumes, Ta remains active until the Pen is reset GLS System esign kgf, Integrated Systems Laboratory (IIS) 23 / 48
50 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Local Clock Generator Ri i Ri i LClk elcntrlxsi ExtClk MUTEX MUTEX elay Register Programmable elay Line Muller-C elcntrlxsi(0) elcntrlxsi(1) elcntrlxsi(2) elcntrlxsi(15) ClkToelayxCI MUX22 N22 1 O212 N22 O212 N22 O212 0 N22 ClkelayedxCO 1 Fine elay elay Slice elay Slice elay Slice elay Slice GLS System esign kgf, Integrated Systems Laboratory (IIS) 24 / 48
51 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow Mutual exclusion element Vdd 3.9µ 0.24µ 3.9µ 0.24µ R1 2.56µ 0.24µ 2.56µ 0.24µ 3.9µ 0.24µ 1.28µ 0.24µ G2 Vdd 3.9µ 0.24µ 3.9µ 0.24µ R2 2.56µ 0.24µ 2.56µ 0.24µ 3.9µ 0.24µ 1.28µ 0.24µ G1 GLS System esign kgf, Integrated Systems Laboratory (IIS) 25 / 48
52 Intro GLS Crypto cacia Results G C R KGF Timing Clock Mutex Flow esign flow for GLS (as used in Shir-Khan) Self-timed library.stg 3 (UCS).eqn eqn2gate (ETHZ).v Signal Trans. Logic Graph Equations Local clock generator Gate Level Netlist.vhdl esign nalyzer (Synopsys).v Silicon Ensemble (Cadence).lef Pearl Timing n. (Cadence).tlf VHL Gate Level Source Code Netlist SIM micro-controller MacroCell Layout Timing Model.vhdl esign nalyzer (Synopsys).v Silicon Ensemble (Cadence).lef Pearl Timing n. (Cadence).tlf VHL Source Code GLS modules Gate Level Netlist MacroCell Layout Timing Model.gals module assembler (ETHZ).vhdl esign nalyzer (Synopsys).v Silicon Ensemble (Cadence).lef Pearl Timing n. (Cadence).tlf Configuration File.scr VHL Source Code Gate Level Netlist MacroCell Layout Timing Model Control Scripts GLS system.vhdl esign nalyzer (Synopsys).v Silicon.lef Pearl Calibre Ensemble Timing n. RC/LVS (Cadence) (Cadence) (Mentor).gds VHL Source Code Gate Level Netlist Layout Final Layout GLS System esign kgf, Integrated Systems Laboratory (IIS) 26 / 48
53 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup ES implementations at IIS Riddler Fastcore res Baby / Pampers 2 x 128 bit parallel 128 bit 128 / 32 bit 16 bit 2.16 Gb/s (pipelined) 2.12 Gb/s 1.15 Gb/s (128 bit) / Gbit/s 37.8 mm 2 (0.6 µm) 3.56 mm 2 (0.25 µm) 1.2 mm 2 (0.25 µm) 0.35 / 0.58 mm 2 (0.25 µm En/ecryption (ECB) En/ecryption (all) Encryption (ECB/OFB) Encryption (ECB/OFB) Parallel atapath Independent Enc/ec Includes masking Plain / Countermeasures GLS System esign kgf, Integrated Systems Laboratory (IIS) 27 / 48
54 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup SubBytes determines ES performance atapath width 8-bit 16-bit 32-bit 64-bit 128-bit Parallel SubBytes units Complexity (gate eq) 5,052 6,281 7,155 11,628 20,410 rea (normalized) Clock cycles for ES Critical path (normalized) Total time (normalized) GLS System esign kgf, Integrated Systems Laboratory (IIS) 28 / 48
55 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup Countermeasures against P attacks Protect your weak spots P measures power consumption dd Noise (unrelated switching activity) to confuse the measurements P targets a specific operation Change the operation order by inserting Random Operations Power consumption of CMOS is data dependent Use lternative Logic Styles There are direct operations between input and output Prevent direct operations by Masking the key with random data GLS System esign kgf, Integrated Systems Laboratory (IIS) 29 / 48
56 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup P attacks work Key 0x Correlation Number of measurements GLS System esign kgf, Integrated Systems Laboratory (IIS) 30 / 48
57 Intro GLS Crypto cacia Results G C R KGF Chips SubBytes Countermeasures P Setup P attack setup GLS System esign kgf, Integrated Systems Laboratory (IIS) 31 / 48
58 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag rea overhead of GLS avid Goliath rea µm 2 183, % 551, % rea µm 2 -LSFRs 26, % 73, % rea µm 2 -ClockGen 7, % 7, % rea µm 2 -Ports 6, % 11, % rea µm 2 -GLS 196, % 570, % rea µm 2 -TOTL 963,855 GLS System esign kgf, Integrated Systems Laboratory (IIS) 32 / 48
59 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Latency overhead of GLS Synchronous GLS+P avid Goliath avid Goliath Critical path (ns) Latency (cycles) Clock freq. (MHz) Enc(clock cycles) Enc time (ns) GLS System esign kgf, Integrated Systems Laboratory (IIS) 33 / 48
60 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Block diagram of avid atainxi ataoutxo 32 PolicyxI ModexSI PenxSO TaxSI ebugatainxi ebugenxsi ebugclkxci bit LFSR Controller Reg ffine Transform InvMixColumns Mult. Inverse Mult. Inverse MixColumns Inverse ffine T. Multiplicative Inverse Output Select ffine Transformation MixColumns GLS System esign kgf, Integrated Systems Laboratory (IIS) 34 / 48
61 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Block diagram of Goliath atainxi ataoutxo ebugatainxi ebugddrinxi ebugenxsi ebugclkxci ModexSI PenxSO TaxSI bit LFSR 128 Controller Reg InvShiftRows Key Expansion x 32 SRM Reg-32 Reg-32 ddroundkey Output Select ShiftRows Reg-128 avid Communication ShiftRows ddroundkey Round Key Generator ToavidTxO FrmavidTxI FrmavidPxI ToavidPxO GLS System esign kgf, Integrated Systems Laboratory (IIS) 35 / 48
62 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Goliath to Synchronous Interface Req+ Pen+ O211 Ri+ Pen i Ta INV1 i+ ck+ Req- Ta+ Ta- Req i OR21 Pen Req i Req NN41 NN21 NN31 Ri NN21 ck- Ri- Pen- i i- Req i N21 ck GLS System esign kgf, Integrated Systems Laboratory (IIS) 36 / 48
63 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Goliath to avid O211 Pen+ i Pen Ta Req+ Ri+ Pen- Ta- O211 INV1 i+ INV1 ck+ Ta+ i- Req N21 Pen Ri ck- Req- Ri- N21 i ck GLS System esign kgf, Integrated Systems Laboratory (IIS) 37 / 48
64 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag avid to Goliath Ta- O211 i- Pen- Pen+ Pen i Z INV1 N21 Ri- Req+ Pen Req BUFL ck- ck+ ck Ri INV1 Req- Ta+ Ri+ i i+ Z OR21 Pen N31 Ta GLS System esign kgf, Integrated Systems Laboratory (IIS) 38 / 48
65 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Scan-test configuration GLS Module LS Island GLS Module LS Island Pen Ta FSM Req ck FSM Pen Ta Lclk Ri i Ri i Lclk Local Clock Local Clock Generator Local Clock Local Clock Generator ScanIn ScanEn ScanClk ScanOut GLS System esign kgf, Integrated Systems Laboratory (IIS) 39 / 48
66 Intro GLS Crypto cacia Results G C R KGF rea Latency avid Goliath G2S G2 2G Test Coverag Stuck-at-fault test coverage Stuck-at-fault testing There are a total of stuck-at faults in the entire circuit Only 182 of these faults are within the asynchronous finite state machines straighforward test vector generation using TetraMax fails to detect faults Using a simple encryption/decryption operation of these faults were detected by simulation. The total test coverage obtained by combining these two methods exceeds 99.8%. GLS System esign kgf, Integrated Systems Laboratory (IIS) 40 / 48
67 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode istribution of the first SubBytes operation Frequency Frequency Frequency Frequency Mode 00 : s fast as possible Mode 01 : Slightly Random Mode 10 : Mostly Random Mode11: Pre-programmed Policy Time [ns] GLS System esign kgf, Integrated Systems Laboratory (IIS) 41 / 48
68 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Simulation result Interface Clk Req ck Req Input for Next Operation ck Output of Last Operation Strb Goliath Request to start cknowledge Req ck Start End Clk avid Tschopp more random less random fast less random more random Clock Pause Req ck Clk avid Perels Req ck Clk ~100MHz ~120MHz ~170MHz ~190MHz ~200MHz ~200MHz ~200MHz ~190MHz ~180MHz ~150MHz 7200 ns 7600 ns 8 us GLS System esign kgf, Integrated Systems Laboratory (IIS) 42 / 48
69 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Operation modes of cacia Operation I/O Clock Encr. Throughput Energy Mode [MHz] [ns] [Mb/s] [mj/mb] cacia cacia cacia , cacia Synchronous GLS System esign kgf, Integrated Systems Laboratory (IIS) 43 / 48
70 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Clock period versus delay-line settings cacia Local Clock Generator Period (Chip #1) 14 Goliath. Perels. Tschopp Simulation 12 Local Clock Period [ns] Number of elay Slices GLS System esign kgf, Integrated Systems Laboratory (IIS) 44 / 48
71 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Clock frequency versus delay-line settings Goliath Clock Generator Frequency (Chip #1-Chip #14) Chip #1 Chip #14 Simulation Local Clock Frequency [MHz] Number of elay Slices GLS System esign kgf, Integrated Systems Laboratory (IIS) 45 / 48
72 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Power consumption vs maximum GLS module frequency 260 cacia Power issipation 240 Power Consumption [mw] Clock Frequency of GLS Modules [MHz] GLS System esign kgf, Integrated Systems Laboratory (IIS) 46 / 48
73 Intro GLS Crypto cacia Results G C R KGF Modes Sim Performance Period Freq Power Power/Mode Power consumption of different operation modes Mode00 Mode01 Mode10 Mode11 cacia Power issipation with ifferent Operation Modes 230 Power Consumption [mw] I/O Clock Period [MHz] GLS System esign kgf, Integrated Systems Laboratory (IIS) 47 / 48
74 Intro GLS Crypto cacia Results G C R KGF F. Kağan Gürkaynak in KG GLS System esign kgf, Integrated Systems Laboratory (IIS) 48 / 48
Scan. This is a sample of the first 15 pages of the Scan chapter.
Scan This is a sample of the first 15 pages of the Scan chapter. Note: The book is NOT Pinted in color. Objectives: This section provides: An overview of Scan An introduction to Test Sequences and Test
More informationFully Pipelined High Speed SB and MC of AES Based on FPGA
Fully Pipelined High Speed SB and MC of AES Based on FPGA S.Sankar Ganesh #1, J.Jean Jenifer Nesam 2 1 Assistant.Professor,VIT University Tamil Nadu,India. 1 s.sankarganesh@vit.ac.in 2 jeanjenifer@rediffmail.com
More informationECEN454 Digital Integrated Circuit Design. Sequential Circuits. Sequencing. Output depends on current inputs
ECEN454 igital Integrated Circuit esign Sequential Circuits ECEN 454 Combinational logic Sequencing Output depends on current inputs Sequential logic Output depends on current and previous inputs Requires
More informationLecture 10: Sequential Circuits
Introduction to CMOS VLSI esign Lecture 10: Sequential Circuits avid Harris Harvey Mudd College Spring 2004 1 Outline Floorplanning Sequencing Sequencing Element esign Max and Min-elay Clock Skew Time
More informationChapter 7 Sequential Circuits
Chapter 7 Sequential Circuits Jin-Fu Li Advanced Reliable Systems (ARES) Lab. epartment of Electrical Engineering National Central University Jungli, Taiwan Outline Latches & Registers Sequencing Timing
More informationTesting of Cryptographic Hardware
Testing of Cryptographic Hardware Presented by: Debdeep Mukhopadhyay Dept of Computer Science and Engineering, Indian Institute of Technology Madras Motivation Behind the Work VLSI of Cryptosystems have
More informationLecture 23 Design for Testability (DFT): Full-Scan
Lecture 23 Design for Testability (DFT): Full-Scan (Lecture 19alt in the Alternative Sequence) Definition Ad-hoc methods Scan design Design rules Scan register Scan flip-flops Scan test sequences Overheads
More informationSystem IC Design: Timing Issues and DFT. Hung-Chih Chiang
System IC esign: Timing Issues and FT Hung-Chih Chiang Outline SoC Timing Issues Timing terminologies Synchronous vs. asynchronous design Interfaces and timing closure Clocking issues Reset esign for Testability
More informationFrom Theory to Practice: Private Circuit and Its Ambush
Indian Institute of Technology Kharagpur Telecom ParisTech From Theory to Practice: Private Circuit and Its Ambush Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger and Debdeep Mukhopadhyay
More informationUnderstanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.
Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by
More informationEE 447/547 VLSI Design. Lecture 9: Sequential Circuits. VLSI Design EE 447/547 Sequential circuits 1
EE 447/547 VLSI esign Lecture 9: Sequential Circuits Sequential circuits 1 Outline Floorplanning Sequencing Sequencing Element esign Max and Min-elay Clock Skew Time Borrowing Two-Phase Clocking Sequential
More informationUnderstanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.
Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by
More informationDesign for Test. Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective.
Design for Test Definition: Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective. Types: Design for Testability Enhanced access Built-In
More informationLecture 11: Sequential Circuit Design
Lecture 11: Sequential Circuit esign Outline q Sequencing q Sequencing Element esign q Max and Min-elay q Clock Skew q Time Borrowing q Two-Phase Clocking 2 Sequencing q Combinational logic output depends
More informationA video signal processor for motioncompensated field-rate upconversion in consumer television
A video signal processor for motioncompensated field-rate upconversion in consumer television B. De Loore, P. Lippens, P. Eeckhout, H. Huijgen, A. Löning, B. McSweeney, M. Verstraelen, B. Pham, G. de Haan,
More informationLecture 23 Design for Testability (DFT): Full-Scan (chapter14)
Lecture 23 Design for Testability (DFT): Full-Scan (chapter14) Definition Ad-hoc methods Scan design Design rules Scan register Scan flip-flops Scan test sequences Overheads Scan design system Summary
More informationBased on slides/material by. Topic Testing. Logic Verification. Testing
Based on slides/material by Topic 4 K. Masselos http://cas.ee.ic.ac.uk/~kostas J. Rabaey http://bwrc.eecs.berkeley.edu/classes/icbook/instructors.html igital Integrated Circuits: A esign Perspective, Prentice
More informationGlitches/hazards and how to avoid them. What to do when the state machine doesn t fit!
State Machine Signaling Timing Behavior Glitches/hazards and how to avoid them SM Partitioning What to do when the state machine doesn t fit! State Machine Signaling Introducing Idle States (synchronous
More informationSequential Circuit Design: Part 1
Sequential Circuit esign: Part 1 esign of memory elements Static latches Pseudo-static latches ynamic latches Timing parameters Two-phase clocking Clocked inverters James Morizio 1 Sequential Logic FFs
More informationDepartment of Information Technology and Electrical Engineering. VLSI III: Test and Fabrication of VLSI Circuits L.
Institut für Integrierte Systeme Integrated Systems Laboratory Department of Information Technology and Electrical Engineering VLSI III: Test and Fabrication of VLSI Circuits 227-0148-00L Exercise 7 Speed
More informationK.T. Tim Cheng 07_dft, v Testability
K.T. Tim Cheng 07_dft, v1.0 1 Testability Is concept that deals with costs associated with testing. Increase testability of a circuit Some test cost is being reduced Test application time Test generation
More informationOverview: Logic BIST
VLSI Design Verification and Testing Built-In Self-Test (BIST) - 2 Mohammad Tehranipoor Electrical and Computer Engineering University of Connecticut 23 April 2007 1 Overview: Logic BIST Motivation Built-in
More informationCPE/EE 427, CPE 527 VLSI Design I Sequential Circuits. Sequencing
CPE/EE 427, CPE 527 VLSI esign I Sequential Circuits epartment of Electrical and Computer Engineering University of Alabama in Huntsville Aleksandar Milenkovic ( www.ece.uah.edu/~milenka ) Combinational
More informationSequential Circuit Design: Part 1
Sequential ircuit esign: Part 1 esign of memory elements Static latches Pseudo-static latches ynamic latches Timing parameters Two-phase clocking locked inverters Krish hakrabarty 1 Sequential Logic FFs
More information2.6 Reset Design Strategy
2.6 Reset esign Strategy Many design issues must be considered before choosing a reset strategy for an ASIC design, such as whether to use synchronous or asynchronous resets, will every flipflop receive
More informationCHAPTER 6 ASYNCHRONOUS QUASI DELAY INSENSITIVE TEMPLATES (QDI) BASED VITERBI DECODER
80 CHAPTER 6 ASYNCHRONOUS QUASI DELAY INSENSITIVE TEMPLATES (QDI) BASED VITERBI DECODER 6.1 INTRODUCTION Asynchronous designs are increasingly used to counter the disadvantages of synchronous designs.
More informationDesign for Testability
TDTS 01 Lecture 9 Design for Testability Zebo Peng Embedded Systems Laboratory IDA, Linköping University Lecture 9 The test problems Fault modeling Design for testability techniques Zebo Peng, IDA, LiTH
More informationStream Ciphers. Debdeep Mukhopadhyay
Stream Ciphers Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -7232 Classifications Objectives Feedback Based Stream
More informationTestability: Lecture 23 Design for Testability (DFT) Slide 1 of 43
Testability: Lecture 23 Design for Testability (DFT) Shaahin hi Hessabi Department of Computer Engineering Sharif University of Technology Adapted, with modifications, from lecture notes prepared p by
More informationOutline. EECS150 - Digital Design Lecture 27 - Asynchronous Sequential Circuits. Cross-coupled NOR gates. Asynchronous State Transition Diagram
EECS150 - Digital Design Lecture 27 - Asynchronous Sequential Circuits Nov 26, 2002 John Wawrzynek Outline SR Latches and other storage elements Synchronizers Figures from Digital Design, John F. Wakerly
More informationPerformance Driven Reliable Link Design for Network on Chips
Performance Driven Reliable Link Design for Network on Chips Rutuparna Tamhankar Srinivasan Murali Prof. Giovanni De Micheli Stanford University Outline Introduction Objective Logic design and implementation
More informationDigital Logic & Computer Design CS Professor Dan Moldovan Spring Chapter 3 :: Sequential Logic Design
igital Logic & Computer esign CS 4341 Professor an Moldovan Spring 21 Copyright 27 Elsevier 3- Chapter 3 :: Sequential Logic esign igital esign and Computer Architecture avid Money Harris and Sarah
More informationSystem IC Design: Timing Issues and DFT. Hung-Chih Chiang
Wireless Information Transmission System Lab. System IC esign: Timing Issues and FT Hung-Chih Chiang Institute of Communications Engineering National Sun Yat-sen University SoC Timing Issues Outline Timing
More informationIntroduction to Digital Logic Missouri S&T University CPE 2210 Flip-Flops
Introduction to igital Logic Missouri S&T University CPE 2210 Flip-Flops Egemen K. Çetinkaya Egemen K. Çetinkaya epartment of Electrical & Computer Engineering Missouri University of Science and Technology
More informationJin-Fu Li Advanced Reliable Systems (ARES) Laboratory. National Central University
Chapter 3 Basics of VLSI Testing (2) Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory Department of Electrical Engineering National Central University Jhongli, Taiwan Outline Testing Process Fault
More informationUsing on-chip Test Pattern Compression for Full Scan SoC Designs
Using on-chip Test Pattern Compression for Full Scan SoC Designs Helmut Lang Senior Staff Engineer Jens Pfeiffer CAD Engineer Jeff Maguire Principal Staff Engineer Motorola SPS, System-on-a-Chip Design
More informationAsynchronous IC Interconnect Network Design and Implementation Using a Standard ASIC Flow
Asynchronous IC Interconnect Network Design and Implementation Using a Standard ASIC Flow Bradley R. Quinton*, Mark R. Greenstreet, Steven J.E. Wilton*, *Dept. of Electrical and Computer Engineering, Dept.
More informationSynchronization in Asynchronously Communicating Digital Systems
Synchronization in Asynchronously Communicating Digital Systems Priyadharshini Shanmugasundaram Abstract Two digital systems working in different clock domains require a protocol to communicate with each
More informationReport on 4-bit Counter design Report- 1, 2. Report on D- Flipflop. Course project for ECE533
Report on 4-bit Counter design Report- 1, 2. Report on D- Flipflop Course project for ECE533 I. Objective: REPORT-I The objective of this project is to design a 4-bit counter and implement it into a chip
More informationEncrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits
Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits Rajit Karmakar, Student Member, IEEE, Santanu Chattopadhyay, Senior Member, IEEE, and Rohit Kapur, Fellow, IEEE arxiv:8.496v
More informationMeasurements of metastability in MUTEX on an FPGA
LETTER IEICE Electronics Express, Vol.15, No.1, 1 11 Measurements of metastability in MUTEX on an FPGA Nguyen Van Toan, Dam Minh Tung, and Jeong-Gun Lee a) E-SoC Lab/Smart Computing Lab, Dept. of Computer
More informationMomentary Changes in Outputs. State Machine Signaling. Oscillatory Behavior. Hazards/Glitches. Types of Hazards. Static Hazards
State Machine Signaling Momentary hanges in Outputs Timing ehavior Glitches/hazards and how to avoid them SM Partitioning What to do when the state machine doesn t fit! State Machine Signaling State Machine
More informationLOW POWER AND HIGH PERFORMANCE SHIFT REGISTERS USING PULSED LATCH TECHNIQUE
OI: 10.21917/ijme.2018.0088 LOW POWER AN HIGH PERFORMANCE SHIFT REGISTERS USING PULSE LATCH TECHNIUE Vandana Niranjan epartment of Electronics and Communication Engineering, Indira Gandhi elhi Technical
More informationVLSI System Testing. BIST Motivation
ECE 538 VLSI System Testing Krish Chakrabarty Built-In Self-Test (BIST): ECE 538 Krish Chakrabarty BIST Motivation Useful for field test and diagnosis (less expensive than a local automatic test equipment)
More informationA High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability. Nikolaos Minas David Kinniment Keith Heron Gordon Russell
A High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability Nikolaos Minas David Kinniment Keith Heron Gordon Russell Outline of Presentation Introduction Background in Time-to-Digital
More informationDesign of Fault Coverage Test Pattern Generator Using LFSR
Design of Fault Coverage Test Pattern Generator Using LFSR B.Saritha M.Tech Student, Department of ECE, Dhruva Institue of Engineering & Technology. Abstract: A new fault coverage test pattern generator
More informationSequential Circuit Design: Principle
Sequential Circuit Design: Principle modified by L.Aamodt 1 Outline 1. 2. 3. 4. 5. 6. 7. 8. Overview on sequential circuits Synchronous circuits Danger of synthesizing asynchronous circuit Inference of
More informationSoC IC Basics. COE838: Systems on Chip Design
SoC IC Basics COE838: Systems on Chip Design http://www.ee.ryerson.ca/~courses/coe838/ Dr. Gul N. Khan http://www.ee.ryerson.ca/~gnkhan Electrical and Computer Engineering Ryerson University Overview SoC
More informationUNIT IV CMOS TESTING. EC2354_Unit IV 1
UNIT IV CMOS TESTING EC2354_Unit IV 1 Outline Testing Logic Verification Silicon Debug Manufacturing Test Fault Models Observability and Controllability Design for Test Scan BIST Boundary Scan EC2354_Unit
More informationEE241 - Spring 2001 Advanced Digital Integrated Circuits. References
EE241 - Spring 2001 Advanced Digital Integrated Circuits Lecture 28 References Rabaey, Digital Integrated Circuits and EE241 (1998) notes Chapter 25, ing of High-Performance Processors by D.K. Bhavsar
More informationVLSI Design: 3) Explain the various MOSFET Capacitances & their significance. 4) Draw a CMOS Inverter. Explain its transfer characteristics
1) Explain why & how a MOSFET works VLSI Design: 2) Draw Vds-Ids curve for a MOSFET. Now, show how this curve changes (a) with increasing Vgs (b) with increasing transistor width (c) considering Channel
More informationAt-speed Testing of SOC ICs
At-speed Testing of SOC ICs Vlado Vorisek, Thomas Koch, Hermann Fischer Multimedia Design Center, Semiconductor Products Sector Motorola Munich, Germany Abstract This paper discusses the aspects and associated
More informationMetastability Analysis of Synchronizer
Forn International Journal of Scientific Research in Computer Science and Engineering Research Paper Vol-1, Issue-3 ISSN: 2320 7639 Metastability Analysis of Synchronizer Ankush S. Patharkar *1 and V.
More informationAn Asynchronous Fully Digital DLL for DDR SDRAM Data Recovery
An Asynchronous Fully Digital DLL for DDR SDRAM Data Recovery Jim Garside et al. University The problem Contents Why asynchronous Some asynchronous bits and pieces Dynamic switching and glitches Overall
More informationLFSR Counter Implementation in CMOS VLSI
LFSR Counter Implementation in CMOS VLSI Doshi N. A., Dhobale S. B., and Kakade S. R. Abstract As chip manufacturing technology is suddenly on the threshold of major evaluation, which shrinks chip in size
More informationfor Digital IC's Design-for-Test and Embedded Core Systems Alfred L. Crouch Prentice Hall PTR Upper Saddle River, NJ
Design-for-Test for Digital IC's and Embedded Core Systems Alfred L. Crouch Prentice Hall PTR Upper Saddle River, NJ 07458 www.phptr.com ISBN D-13-DflMfla7-l : Ml H Contents Preface Acknowledgments Introduction
More informationA Low-power Pipelined Implementation of 2D Discrete Wavelet Transform
A Low-power Pipelined Implementation of iscrete Wavelet Transform Yong Liu¹, Edmund M-K. Lai¹, A.B. Premkumar¹ and amu Radhakrishnan² ¹School of Computer Engineering, Nanyang Technological University,
More informationEfficient Architecture for Flexible Prescaler Using Multimodulo Prescaler
Efficient Architecture for Flexible Using Multimodulo G SWETHA, S YUVARAJ Abstract This paper, An Efficient Architecture for Flexible Using Multimodulo is an architecture which is designed from the proposed
More information11. Sequential Elements
11. Sequential Elements Jacob Abraham Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017 October 11, 2017 ECE Department, University of Texas at Austin
More informationCo-simulation Techniques for Mixed Signal Circuits
Co-simulation Techniques for Mixed Signal Circuits Tudor Timisescu Technische Universität München Abstract As designs grow more and more complex, there is increasing effort spent on verification. Most
More informationVLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits
VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits N.Brindha, A.Kaleel Rahuman ABSTRACT: Auto scan, a design for testability (DFT) technique for synchronous sequential circuits.
More informationSynchronous Digital Logic Systems. Review of Digital Logic. Philosophy. Combinational Logic. A Full Adder. Combinational Logic
Synchronous igital Logic Systems Review of igital Logic Prof. Stephen. Edwards Raw materials: MOS transistors and wires on Is Wires are excellent conveyors of voltage Little leakage Fast, but not instantaneous
More informationLaboratory 4. Figure 1: Serdes Transceiver
Laboratory 4 The purpose of this laboratory exercise is to design a digital Serdes In the first part of the lab, you will design all the required subblocks for the digital Serdes and simulate them In part
More informationA Novel Low-overhead Delay Testing Technique for Arbitrary Two-Pattern Test Application
A Novel Low-overhead elay Testing Technique for Arbitrary Two-Pattern Test Application Swarup Bhunia, Hamid Mahmoodi, Arijit Raychowdhury, and Kaushik Roy School of Electrical and Computer Engineering,
More informationEECS150 - Digital Design Lecture 10 - Interfacing. Recap and Topics
EECS150 - Digital Design Lecture 10 - Interfacing Oct. 1, 2013 Prof. Ronald Fearing Electrical Engineering and Computer Sciences University of California, Berkeley (slides courtesy of Prof. John Wawrzynek)
More informationDesign and Simulation of a Digital CMOS Synchronous 4-bit Up-Counter with Set and Reset
Design and Simulation of a Digital CMOS Synchronous 4-bit Up-Counter with Set and Reset Course Number: ECE 533 Spring 2013 University of Tennessee Knoxville Instructor: Dr. Syed Kamrul Islam Prepared by
More informationLevel and edge-sensitive behaviour
Level and edge-sensitive behaviour Asynchronous set/reset is level-sensitive Include set/reset in sensitivity list Put level-sensitive behaviour first: process (clock, reset) is begin if reset = '0' then
More informationElectrical & Computer Engineering ECE 491. Introduction to VLSI. Report 1
Electrical & Computer Engineering ECE 491 Introduction to VLSI Report 1 Marva` Morrow INTRODUCTION Flip-flops are synchronous bistable devices (multivibrator) that operate as memory elements. A bistable
More informationSequences and Cryptography
Sequences and Cryptography Workshop on Shift Register Sequences Honoring Dr. Solomon W. Golomb Recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering Guang Gong Department of Electrical
More informationA Symmetric Differential Clock Generator for Bit-Serial Hardware
A Symmetric Differential Clock Generator for Bit-Serial Hardware Mitchell J. Myjak and José G. Delgado-Frias School of Electrical Engineering and Computer Science Washington State University Pullman, WA,
More informationPICOSECOND TIMING USING FAST ANALOG SAMPLING
PICOSECOND TIMING USING FAST ANALOG SAMPLING H. Frisch, J-F Genat, F. Tang, EFI Chicago, Tuesday 6 th Nov 2007 INTRODUCTION In the context of picosecond timing, analog detector pulse sampling in the 10
More informationChapter 5 Flip-Flops and Related Devices
Chapter 5 Flip-Flops and Related Devices Chapter 5 Objectives Selected areas covered in this chapter: Constructing/analyzing operation of latch flip-flops made from NAND or NOR gates. Differences of synchronous/asynchronous
More informationA CHARGE RECYCLING THREE-PHASE DUAL-RAIL PRE-CHARGE LOGIC BASED FLIP-FLOP
A CHARGE RECYCLING THREE-PHASE DUAL-RAIL PRE-CHARGE LOGIC BASED FLIP-FLOP Kothagudem Mounika, S. Rajendar, R. Naresh Department of Electronics and Communication Engineering, Vardhaman College of Engineering,
More informationFigure 1 shows a simple implementation of a clock switch, using an AND-OR type multiplexer logic.
1. CLOCK MUXING: With more and more multi-frequency clocks being used in today's chips, especially in the communications field, it is often necessary to switch the source of a clock line while the chip
More informationBit Swapping LFSR and its Application to Fault Detection and Diagnosis Using FPGA
Bit Swapping LFSR and its Application to Fault Detection and Diagnosis Using FPGA M.V.M.Lahari 1, M.Mani Kumari 2 1,2 Department of ECE, GVPCEOW,Visakhapatnam. Abstract The increasing growth of sub-micron
More informationEEC 116 Fall 2011 Lab #5: Pipelined 32b Adder
EEC 116 Fall 2011 Lab #5: Pipelined 32b Adder Dept. of Electrical and Computer Engineering University of California, Davis Issued: November 2, 2011 Due: November 16, 2011, 4PM Reading: Rabaey Sections
More informationLogic Design ( Part 3) Sequential Logic- Finite State Machines (Chapter 3)
Logic esign ( Part ) Sequential Logic- Finite State Machines (Chapter ) Based on slides McGraw-Hill Additional material 00/00/006 Lewis/Martin Additional material 008 Roth Additional material 00 Taylor
More informationA Novel Asynchronous ADC Architecture
A Novel Asynchronous ADC Architecture George Robert Harris III and Taskin Kocak School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 3286-2450 tkocak@cpeucfedu
More informationChapter 8 Design for Testability
電機系 Chapter 8 Design for Testability 測試導向設計技術 2 Outline Introduction Ad-Hoc Approaches Full Scan Partial Scan 3 Design For Testability Definition Design For Testability (DFT) refers to those design techniques
More informationLow Power VLSI CMOS Design An Image Processing Chip for RGB to HSI Conversion
Low Power VLSI CMOS Design An Image Processing Chip for RGB to HSI Conversion A.Th. Schwarzbacher 1,2 and J.B. Foley 2 1 Dublin Institute of Technology, Dept. Of Electronic and Communication Eng., Dublin,
More informationASNT8140. ASNT8140-KMC DC-23Gbps PRBS Generator with the (x 7 + x + 1) Polynomial. vee. vcc qp. vcc. vcc qn. qxorp. qxorn. vee. vcc rstn_p.
ASNT8140-KMC DC-23Gbps PRBS Generator with the (x 7 + x + 1) Polynomial Full-length (2 7-1) pseudo-random binary sequence (PRBS) generator DC to 23Gbps output data rate Additional output delayed by half
More informationdata and is used in digital networks and storage devices. CRC s are easy to implement in binary
Introduction Cyclic redundancy check (CRC) is an error detecting code designed to detect changes in transmitted data and is used in digital networks and storage devices. CRC s are easy to implement in
More informationFPGA Development for Radar, Radio-Astronomy and Communications
John-Philip Taylor Room 7.03, Department of Electrical Engineering, Menzies Building, University of Cape Town Cape Town, South Africa 7701 Tel: +27 82 354 6741 email: tyljoh010@myuct.ac.za Internet: http://www.uct.ac.za
More informationVARIABLE FREQUENCY CLOCKING HARDWARE
VARIABLE FREQUENCY CLOCKING HARDWARE Variable-Frequency Clocking Hardware Many complex digital systems have components clocked at different frequencies Reason 1: to reduce power dissipation The active
More informationASNT8142-KMC Generator of DC-to-23Gbps PRBS with Selectable Polynomials
ASNT8142-KMC Generator of DC-to-23Gbps PRBS with Selectable Polynomials Full-length (2 15-1) or (2 7-1) pseudo-random binary sequence (PRBS) generator Selectable power of the Polynomial DC to 23Gbps output
More informationSingle Channel LVDS Tx
April 2013 Introduction Reference esign R1162 Low Voltage ifferential Signaling (LVS) is an electrical signaling system that can run at very high speeds over inexpensive twisted-pair copper cables. It
More informationProject 6: Latches and flip-flops
Project 6: Latches and flip-flops Yuan Ze University epartment of Computer Engineering and Science Copyright by Rung-Bin Lin, 1999 All rights reserved ate out: 06/5/2003 ate due: 06/25/2003 Purpose: This
More informationIntroduction. NAND Gate Latch. Digital Logic Design 1 FLIP-FLOP. Digital Logic Design 1
2007 Introduction BK TP.HCM FLIP-FLOP So far we have seen Combinational Logic The output(s) depends only on the current values of the input variables Here we will look at Sequential Logic circuits The
More informationEL302 DIGITAL INTEGRATED CIRCUITS LAB #3 CMOS EDGE TRIGGERED D FLIP-FLOP. Due İLKER KALYONCU, 10043
EL302 DIGITAL INTEGRATED CIRCUITS LAB #3 CMOS EDGE TRIGGERED D FLIP-FLOP Due 16.05. İLKER KALYONCU, 10043 1. INTRODUCTION: In this project we are going to design a CMOS positive edge triggered master-slave
More informationDesign for Testability Part II
Design for Testability Part II 1 Partial-Scan Definition A subset of flip-flops is scanned. Objectives: Minimize area overhead and scan sequence length, yet achieve required fault coverage. Exclude selected
More informationVLSI Based Minimized Composite S-Box and Inverse Mix Column for AES Encryption and Decryption
VLSI Based Minimized Composite S-Bo and Inverse Mi Column for AES Encryption and Decryption 1 J. Balamurugan, 2 Dr. E. Logashanmugam 1 Research scholar, 2 Professor and Head, 1 St. Peter s University,
More informationInstructions. Final Exam CPSC/ELEN 680 December 12, Name: UIN:
Final Exam CPSC/ELEN 680 December 12, 2005 Name: UIN: Instructions This exam is closed book. Provide brief but complete answers to the following questions in the space provided, using figures as necessary.
More informationVirtualScan TM An Application Story
Test Data Compaction Tool from SynTest TM VirtualScan TM An Application Story January 29, 2004 Hiroshi Furukawa SoC No. 3 Group, SoC Development Division 1 Agenda Current Problems What is VirtualScan?
More informationDESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR
International Journal of Computer Science and Applications, Vol. 6, No, 4, pp 43-62, 29 Technomathematics Research Foundation DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA
More informationDiagnosis of Resistive open Fault using Scan Based Techniques
Diagnosis of Resistive open Fault using Scan Based Techniques 1 Mr. A. Muthu Krishnan. M.E., (Ph.D), 2. G. Chandra Theepa Assistant Professor 1, PG Scholar 2,Dept. of ECE, Regional Office, Anna University,
More informationTesting Digital Systems II
Testing Digital Systems II Lecture 5: Built-in Self Test (I) Instructor: M. Tahoori Copyright 2010, M. Tahoori TDS II: Lecture 5 1 Outline Introduction (Lecture 5) Test Pattern Generation (Lecture 5) Pseudo-Random
More informationCHAPTER 6 DESIGN OF HIGH SPEED COUNTER USING PIPELINING
149 CHAPTER 6 DESIGN OF HIGH SPEED COUNTER USING PIPELINING 6.1 INTRODUCTION Counters act as important building blocks of fast arithmetic circuits used for frequency division, shifting operation, digital
More informationEITF35: Introduction to Structured VLSI Design
EITF35: Introduction to Structured VLSI Design Part 4.2.1: Learn More Liang Liu liang.liu@eit.lth.se 1 Outline Crossing clock domain Reset, synchronous or asynchronous? 2 Why two DFFs? 3 Crossing clock
More informationLogic Analysis Basics
Logic Analysis Basics September 27, 2006 presented by: Alex Dickson Copyright 2003 Agilent Technologies, Inc. Introduction If you have ever asked yourself these questions: What is a logic analyzer? What
More informationVLSI Test Technology and Reliability (ET4076)
VLSI Test Technology and Reliability (ET476) Lecture 9 (2) Built-In-Self Test (Chapter 5) Said Hamdioui Computer Engineering Lab Delft University of Technology 29-2 Learning aims Describe the concept and
More information