Responsive image
博碩士論文 etd-0725105-125204 詳細資訊
Title page for etd-0725105-125204
論文名稱
Title
邏輯化簡之電路產生器及在先進加密標準上的應用
A Circuit Generator for Logic Reduction of Boolean Functions and Its Application to the Design of Advanced Encryption Standard
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
70
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2005-07-11
繳交日期
Date of Submission
2005-07-25
關鍵字
Keywords
邏輯化簡、先進加密標準
advanced encryption standard, aes, logic reduction
統計
Statistics
本論文已被瀏覽 5704 次,被下載 3268
The thesis/dissertation has been browsed 5704 times, has been downloaded 3268 times.
中文摘要
IC設計的流程包含了布林方程式的化簡,為了減少相對應的電路面積,我們必需在化簡的程序中盡可能的將布林方程式化簡。在一般的布林方程式化簡中,最主要的步驟是先將布林方程式化為SOP(Sum Of Product)的形式,再利用各種演算方法針對SOP格式的布林方程式化簡。針對SOP布林方程式格式的主要化簡方法分為two-level和three-level的化簡方式,尤以three-level化簡所得的結果更佳。今我們以找出適當的共用式的方法,將其應用在布林方程式化簡上,藉由取出共用的電路,使電路的面積、時間及電源消耗上的成本能夠得到有效的改善。同時,在一般邏輯電路合成的流程上,若能將布林方程式化簡完後同時程式能夠立即產生可合成的硬體描述語言檔案,減少額外撰寫硬體描述語言程式的動作,將能有效的節省在設計上的時間。本論文提出十種布林方程式共用式消除的方法,配合簡易的操作,能快速的產生所需的可合成硬體描述語言檔案,檔案再經由Synopsys EDA Tool合成後,可得到十一種結果(面績、時間),由各種結果的效能考量我們可以由其中挑選出最合適的電路。另外配合本論文的方法,我們實作出AES(Advanced Encryption Standard)的晶片,並經過詳細的驗証,確認晶片功能正確並可以正常運作,由晶片實作的結果得知,使用我們的演算法實作AES晶片,在電路的面積上能獲得有效的改善。在數位訊號處理的數位濾波器,有限場多項式乘法應用中的密碼學演算法AES(Advanced Encryption Standard),及錯誤更正碼(Error Correcting Code)中,我們可以把三種應用最後所呈現的結果以布林方程式的形式表示(AND-XOR),然後應用取公因式的化簡方法在每一個方程式上,同樣地也可以有效的減少其電路面績及功率消耗。
Abstract
The constant matrix multiplication is one of the key operations in many applications including digital signal processing, communication, and coding. In general, constant matrix multiplication can be expressed as bit-level Boolean functions. Then, common subexpression elimination (CSE) can be used to reduce the area cost of realizing these bit-level functions by finding the shared common factors among these bit-level equations. The proposed circuit generator performs logic reduction on the input Boolean functions and produces the simplified Verilog HDL codes as output. Then the simplified code is fed into Synopsys Design Compiler for further logic minimization and technology mapping to generate gate-level netlists. In this thesis, we present ten different CSE algorithms for logic reduction of the bit-level Boolean functions. The comparisons include both the architecture-level technology-independent results and the Synopsys synthesized technology-dependent results. According to the experiments, we observe that our CSE can effectively reduce the area cost. We also apply the CSE to the design of the Advanced Encryption Standard (AES) in cryptography.
目次 Table of Contents
中文摘要 I
Abstract II
目 錄 III
圖目錄 V
表目錄 VI
第一章、導論 1
1.1 研究動機 1
1.2 內容大綱 1
第二章、邏輯化簡相關研究 2
2.1 Synopsys的邏輯化簡方法 2
2.2 一般邏輯化簡 4
2.3 Paar的公因式消去法 6
2.4 CSE演算法在多重常數乘法上的應用 8
第三章、演算法與程式實作 11
3.1 邏輯運算表示法 11
3.2 公因式消去演算法 12
3.2.1 水平起始化簡 12
3.2.1.1 取最大漢明指標行對 13
3.2.1.2 取最小行標關連 14
3.2.1.3 取【w(i) + w(j)】總數最少 14
3.2.1.4 考量次高漢明指標的行對 15
3.2.2 垂直起始化簡 15
3.2.3 二回合式(2-round) 16
3.2.4 垂直化簡挑選省最多面積(公因式個數不限) 17
3.2.5 垂直化簡挑選省最多面積(公因式個數為2n) 18
3.2.6 垂直化簡選最大漢明指標(fanout數大於1) 18
3.2.7 垂直化簡選最大漢明指標(fanout數大於1且公因式個數為2n) 18
3.2.8 水平化簡挑選省最多面積(公因式個數不限) 18
3.2.9 水平化簡挑選省最多面積(公因式個數為2n) 19
3.2.10 水平化簡選最大漢明指標 19
3.2.11 各種演算法綜合說明 19
3.3 計算方程式的延遲時間(delay time) 20
3.4 實作流程 22
3.5 程式輸入、輸出規格 23
3.6 程式介面說明 24
第四章、實作應用與數據分析、比較 26
4.1資料加密理論(Advanced Encryption Standard) 26
4.2 實驗結果分析 29
4.2.1 不經由Synopsys Design Compiler化簡 29
4.2.2 經由Synopsys Design Compiler化簡 36
4.3 實驗討論 38
第五章、AES晶片實作 40
5.1 AES簡介 40
5.2 AES硬體架構 40
5.3 晶片實作過程與結果 41
5.3.1 使用CSE演算法化簡 42
5.3.2 設計流程 43
5.3.3 AES的硬體實現 44
5.3.4 AES功能証驗 47
5.4 結果比較 50
第六章、其他應用及未來工作 51
6.1 數位訊號處理器(FIR Filter) 51
6.2 Reed Solomon Codes 51
6.2 ISCAS Benchmark Circuits 52
6.3 設計流程整合 53
6.4 未來工作 54
參考文獻 55
附錄 58
測試檔範例 58
利用Synopsys Design Compiler轉換成GTECH所需的Script file 60
參考文獻 References
[1] J. Daemen and R. Rijmen, “AES Proposal: Rijndael,” version 2, 1999. A-vailable at http://www.esat.kuleuven.ac.be/~rijmen/rijndael.“Advanced Encry-ption Standard (AES),” Federal Information Processing Standards Publication 197, Nov. 26, 2001. Available at http://www.nist.gov/CryptoToolkit.
[2] E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, J. Nechvatal, and E. Roback. “Report on the Development of the Advanced Encryption Stand-ard (AES),” National Institute of Standards and Technology, Oct. 2000. A-vailable at http://csrc.nist.gov/encryption/aes/round2/r2report.pdf.
[3] X. Zhang and K. K. Parhi, ”Implementation approaches for the Advanced Encryption Standard algorithm” IEEE Circuit and Systems Magazine, Vol. 2, Fourth Quarter, pp. 24-46 2002.
[4] Yu Yao, Hsin-Horng Chen, Tsuan-Fan Lin, Chiang-Ju Chien, and Chun-Te Hsu, “A novel common-subexpression-elimination method for synthesizing fixed-point FIR filters,” IEEE Trans. Circuits Syst. I., vol. 51, no. 11, pp. 2215-2221, Nov. 2004.
[5] H. Safiri, M. Ahmadi, “A New Algorithm for the Elimination of Common Subexpressions in Hardware Implementation of Digital Filters by Using Genetic Programming”, IEEE International Conference, pp: 319-328, July 2000.
[6] C. Paar, “A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composite Fields”, IEEE Transactions on Computers, Vol. 45, pp. 856-61, July 1996.
[7] R. Pasko, P. Schaumont, V. Derudder, S. Vermalde, D. Durackova, “A Ne-w Algorithm for Elimination of Common Subexpressions”, Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions, Vol. 18, pp. 58-68, Jan 1999.
[8] SYNOPSYS Design Complier Reference Manual: Optimization and Timing Analysis, v2003.06.
[9] M. Potkonjak, M. B. Srivastava and A. P. Chandrakasan, “Multiple consta-ts multiplications: efficient and versatile framework and algorithms for ex-ploring common subexpression elimination”, IEEE Trans. Computer-Aided Design, vol. 15, NO. 2, pp 151-161, Feb 1996.
[10] Synopsys “Design Compiler Reference Manual: Optimization and Timing Analysis”, vU-2003.06
[11] C. Paar. “Efficient VLSI Architecture for Bit-Parallel Computation in Galo-is Fields”, PhD thesis, Institute for Experimental Mathematics, University of Essen, English Translatio, 1994.
[12] Alain Poli, Llorenc Huguet, “Error Correcting Codes Theory and Applicati-ons”, 1992.
[13] H. Kuo and I. Verbauwhede, “Architectural Optimization for a 1.82 Gbits/sec VLSI Implementation of the AES Rijndael Algorithm,” Proceedings of Cryptographic Hardware and Embedded Systems 2001, pp. 51-64, Paris, F-rance, May 2001.
[14] C. P. Su, T. F. Lin, C. T. Huang, C. W. Wu, “A High-Throughput Low-Cost AES Processor,” IEEE Communications Magazine, Vol. 41, pp. 86-91, Dec. 2003.
[15] S. Morioka and A. Satoh, “A 10 Gb/s full-AES Crypto Design with a T-wisted-BDD S-Box Architecture”, Proceedings of IEEE International Conf-erence on Computer Design: VLSI in Computers and Processors 2002, pp. 98-103, Freiburg, Germany, Sept. 2002.
[16] N. S. Kim, T. Mudge, and R. Brown, “A 2.3Gb/s Fully Integrated and S-ynthesizable AES Rijndael Core,” Proceedings of IEEE Custom Integrated Circuits 2003, pp. 193-196, Sept. 2003.
[17] C. C. Lu and S. Y. Tseng, “Integrated Design of AES (Advanced Encrypt-ion Standard) Encrypter and Decrypter,” Proceedings of Application-Specific Systems, Architectures and Processors, pp. 277-285, July 2002.
[18] A. Satoh, S. Morioka, K. Takano, and S. Munetoh, “A Compact Rijndael Hardware Architecture with S-Box Optimization,” Advanced in Cryptograp-hy- ASIACRYPT 2001, LNCS 2248, pp. 239-254, 2001.
[19] F. K Gurkayank, A. Burg, N. Felber, W. Fichtner, D. Gasser, F. Hug, and H. Kaeslin, “A 2 Gb/s Balanced AES Crypto-Chip Implementation,” 14th ACM Great Lakes on VLSI (GLSVLSI’04), pp. 39-44, 2004.
[20] Y. K. Lai, L. C. Chang, L. F. Chen, C. C. Chou, and C. W. Chiu, “A N-ovel Memoryless AES Cipher Architecture For Networking Application,” IEEE International Symposium on Circuits and Systems (ISCAS), Vol. 4, pp. 333-336, 2004.
[21] R. Sever, A. N. Ismailoglu, Y. C. Tekmen, and M. Askar, “A High Speed ASIC Implementation of the Rijndael Algorithm,” IEEE International Sy-mposium on Circuits and Systems (ISCAS), Vol. 2, pp. 541- 544, 2004.
[22] M. Hansen, H. Yalcin, and J. P. Hayes, “Unveiling the ISCAS-85 Bench-marks: A Case Study in Reverse Engineering,” IEEE Design and Test, vol. 16, no. 3, pp. 72-80, July Sept, 1999.
[23] John P. Hayes, “INTRODUCTION TO DIGITAL LOGIC DESIGN,” ADD-ISON WESLEY, May, 1994.
[24] R. Murgai, R.K. Brayton, A. Sangiovanni, “Cube-packing and Two-level Minimization”, IEEE/ACM International Conference, pp. 115-122, 1993.
[25] T. Vila, A. Saldanla, R.K. Brayton, A. Sangiovanni, “Symbolic Two-level Minimization,” Computer-Aided Design of Integrated Circuits and Systems, IEEE Trans. on Vol. 16, Issue 7, pp. 692-708, 1997.
[26] A.A. Malik, D. Harrison, R.K. Brayton, “Three-level Decomposition With Application to PLDs,” Computer Design, IEEE International Conference, pp. 628-633, 1991.
[27] A. Bernasconi, V. Ciriani, F. Luccio, L. Pagli, “Three-level Logic Minimi-zation Based on Function Regularities,” Computer-Aided Design of Integra-ted Circuits and Systems, IEEE Trans. on Vol. 22, Issue 8, pp. 1005-1016, 2003.
[28] R.W. Mehler, M.R. Mercer, “Multi-level Logic Minimization Through Fault Dictionary Analysis,” Computer Design, IEEE International Conference, pp315-318, 1999.
[29] L. Wang, A.E.A. Almaini, “Multilevel Logic Minimization Using Function-al Don’t Cares,” VLSI Design, Fourteen International Conference, pp. 417-424, 2001.
[30] P.C. McGeer, J.V. Sanghavi, R.K. Brayton, A.L. Sangiovanni,”ESPRESSO-SIGNATURE: a new exact minimizer for logic functions,” Very Large Sc-ale Integration (VLSI) Systems, IEEE Trans. Vol. 1, Issue 4, pp. 432-440, 1993.
[31] E. Dubrove, P. Ellervee, “A Fast Algorithm for Three-level Logic Optimiz-ation,” in Int. Workshop on Logic Synthesis, pp. 251-254, 1999.
[32] A. Jabir, J. Saul, “Heuristic AND-OR-EXOR Three-level Minimization Al-gorithm for Multiple-output Incompletely-specified Boolean Functions,” Co-puters and Digital Technologies, IEE Proceedings, Vol 147, Issue 6, pp. 451-461, 2000.
[33] F. Luccio, L. Pagli, “On A New Boolean Function with Applications,” C-omputers, IEEE Trans. Vol 48, Issue 3, pp. 296-310, 1999.
[34] V. Ciriani, “Logic Minimization Using Exclusive OR gates,” Design Auto-mation Conf., pp. 115-120, 2001.
[35] I. S. Reed and G. Solomon, “Polynomial Codes over Certain Finite Field-s,” J. SIAM, vol. 8, pp. 300-304, 1960.
[36] Reed Solomon Codes, J. Sylvester, Jan. 2001.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內立即公開,校外一年後公開 off campus withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code