FIRST REVIEW.

Slides:



Advertisements
Similar presentations
Finite Fields Rong-Jaye Chen. p2. Finite fields 1. Irreducible polynomial f(x)  K[x], f(x) has no proper divisors in K[x] Eg. f(x)=1+x+x 2 is irreducible.
Advertisements

BCH Codes Hsin-Lung Wu NTPU.
CHANNEL CODING REED SOLOMON CODES.
Error Detection and Correction Parity Schemes: Modulo 2 addition (XOR) Word parity Block Parity.
Copyright 2005, Agrawal & BushnellVLSI Test: Lecture 21alt1 Lecture 21alt BIST -- Built-In Self-Test (Alternative to Lectures 25, 26 and 27) n Definition.
1 EECS Components and Design Techniques for Digital Systems Lec 26 – CRCs, LFSRs (and a little power) David Culler Electrical Engineering and Computer.
Announcements: Ch 3 quiz next week (tentatively Friday). Will include fields (today) Ch 3 quiz next week (tentatively Friday). Will include fields (today)Today:
Design for Testability Theory and Practice Lecture 11: BIST
Forward Error Correction Steven Marx CSC45712/04/2001.
Chapter 2 : Direct Link Networks (Continued). So far... Modulation and Encoding Link layer protocols Error Detection -- Parity Check.
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
David Culler Electrical Engineering and Computer Sciences
Announcements: Quizzes graded, but not in gradebook. (Current grade gives 0 on the parts you shouldn’t have done .) Quizzes graded, but not in gradebook.
M. Khalily Dermany Islamic Azad University.  finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography,
CPSC 3730 Cryptography and Network Security
Part.7.1 Copyright 2007 Koren & Krishna, Morgan-Kaufman FAULT TOLERANT SYSTEMS Part 7 - Coding.
Cyclic Codes for Error Detection W. W. Peterson and D. T. Brown by Maheshwar R Geereddy.
Session 1 Stream ciphers 1.
Chapter 4 – Finite Fields
Lecture 6: Framing and Error Detection-Data Link Layer Functions
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
Important Components, Blocks and Methodologies. To remember 1.EXORS 2.Counters and Generalized Counters 3.State Machines (Moore, Mealy, Rabin-Scott) 4.Controllers.
Cyclic Redundancy Check CRC Chapter CYCLIC CODES Cyclic codes are special linear block codes with one extra property. In a cyclic code, if a codeword.
More Digital circuits. Ripple Counter The most common counter The problem is that, because more than one output is changing at once, the signal is glichy.
Linear Feedback Shift Register. 2 Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple.
Great Theoretical Ideas in Computer Science.
TOPIC : Signature Analysis. Introduction Signature analysis is a compression technique based on the concept of (CRC) Cyclic Redundancy Checking It realized.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Error Detection and Correction
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Part III: Data Link Layer Error Detection and Correction
Class Report 林格名 : Reed Solomon Encoder. Reed-Solomom Error Correction When a codeword is decoded, there are three possible outcomes –If 2s + r < 2t (s.
1 Modeling Synchronous Logic Circuits Debdeep Mukhopadhyay Associate Professor Dept of Computer Science and Engineering NYU Shanghai and IIT Kharagpur.
V. Non-Binary Codes: Introduction to Reed Solomon Codes
Dr. Clincy Professor of CS
Mathematical Background: Extension Fields
Combinational Logic Design
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Dr. Clincy Professor of CS
Hardware Testing and Designing for Testability
Advanced Computer Networks
Part III Datalink Layer 10.
VLSI Testing Lecture 14: Built-In Self-Test
Week 5, Verilog & Full Adder
Sequential circuits and Digital System Reliability
Chapter 3 Digital Transmission Fundamentals
Developing More Advanced Testbenches
Lecture 3 Digital Transmission Fundamentals
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Transmission Errors Error Detection and Correction
Cyclic Code.
Finite Fields Rong-Jaye Chen.
Coding and Error Control
I. Finite Field Algebra.
Data Link Layer Objective: to achieve reliable and efficient communication between 2 adjacent machines Data link layer design issues services provided.
Error Correction Code (1)
John Kubiatowicz Electrical Engineering and Computer Sciences
EECS Components and Design Techniques for Digital Systems Lec 26 – CRCs, LFSRs (and a little power) David Culler Electrical Engineering and Computer.
THE ECE 554 XILINX DESIGN PROCESS
Cryptology Design Fundamentals
Transmission Errors Error Detection and Correction
Error Correction Code (1)
Digital Designs – What does it take
THE ECE 554 XILINX DESIGN PROCESS
عنوان درس نام استاد
296.3:Algorithms in the Real World
Chapter 10 Error Detection and Correction
Introduction to Modern Cryptography
Mathematical Background: Extension Finite Fields
Presentation transcript:

FIRST REVIEW

Design and Implementation of High Speed VLSI Architecture for General Linear Feedback Shift Register (LFSR) Structures

INTRODUCTION Linear Feedback Shift Register (LFSR) structures are widely used in digital signal processing and communication systems, such as BCH, CRC. A linear feedback shift register (LFSR) is a shift register whose input bit is a linear function of its previous state. One of the two main parts of an LFSR is the shift register (the other being the feedback function). A shift register is a device whose identifying function is to shift its contents into adjacent positions within the register or, in the case of the position on the end, out of the register. The position on the other end is left empty unless some new content is shifted into the register.

Basic LFSR architecture FCS ………... x0 x1 Xn-1 x00 Xnn-1 x11 d D Q CK CLR D Q CK CLR D Q CK CLR clock clear Divisor p0 …....... p1 Pm-1

Architectures for polynomial G (y)=1+y+y3+y5. Data Y0 + Y1 Y2 + Y3 Y4 +

Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple shift-registers with a small number of xor gates. Used for: random number generation counters error checking and correction Advantages: very little hardware high speed operation Example 4-bit LFSR:

Project Overview Identify the Architecture From the literature survey Model the Architecture into RTL [register transfer level]modeling Verify the functionality of Modeled architecture in MODELSIM® Synthesis the verified design in Xilinx ISE® Generation of Bit map file for Dump into Spartan 3E FPGA Program the Bit map file into FPGA.

Advantages: LFSR takes less area than any other common counter. High speed of operation than any other common counter

LFSR Applications Pattern Generators Counters Built-in Self-Test (BIST) Encryption Compression Checksums Pseudo-Random Bit Sequences (PRBS)

LANGUAGES USED AND TOOLS Verilog HDL TOOLS REQUIRED: Xilinx - Synthesis MODELSIM – Simulation,

CRC concept I have a msg polynomial M(x) of degree m We both have a generator poly G(x) of degree m Let r(x) = remainder of M(x) xn / G(x) M(x) xn = G(x)p(x) + r(x) r(x) is of degree n What is (M(x) xn – r(x)) / G(x) ? So I send you M(x) xn – r(x) m+n degree polynomial You divide by G(x) to check M(x) is just the m most signficant coefficients, r(x) the lower m n-bit Message is viewed as coefficients of n-degree polynomial over binary numbers n bits of zero at the end tack on n bits of remainder Instead of the zeros

Galois Fields - the theory behind LFSRs LFSR circuits performs multiplication on a field. A field is defined as a set with the following: two operations defined on it: “addition” and “multiplication” closed under these operations associative and distributive laws hold additive and multiplicative identity elements additive inverse for every element multiplicative inverse for every non-zero element Example fields: set of rational numbers set of real numbers set of integers is not a field (why?) Finite fields are called Galois fields. Example: Binary numbers 0,1 with XOR as “addition” and AND as “multiplication”. Called GF(2). 0+1 = 1 1+1 = 0 0-1 = ? 1-1 = ?

Galois Fields - The theory behind LFSRs Consider polynomials whose coefficients come from GF(2). Each term of the form xn is either present or absent. Examples: 0, 1, x, x2, and x7 + x6 + 1 = 1·x7 + 1· x6 + 0 · x5 + 0 · x4 + 0 · x3 + 0 · x2 + 0 · x1 + 1· x0 With addition and multiplication these form a field: “Add”: XOR each element individually with no carry: x4 + x3 + + x + 1 + x4 + + x2 + x x3 + x2 + 1 “Multiply”: multiplying by xn is like shifting to the left. x2 + x + 1  x + 1 x3 + x2 + x x3 + 1

Galois Fields - The theory behind LFSRs These polynomials form a Galois (finite) field if we take the results of this multiplication modulo a prime polynomial p(x). A prime polynomial is one that cannot be written as the product of two non-trivial polynomials q(x)r(x) Perform modulo operation by subtracting a (polynomial) multiple of p(x) from the result. If the multiple is 1, this corresponds to XOR-ing the result with p(x). For any degree, there exists at least one prime polynomial. With it we can form GF(2n) Additionally, … Every Galois field has a primitive element, , such that all non-zero elements of the field can be expressed as a power of . By raising  to powers (modulo p(x)), all non-zero field elements can be formed. Certain choices of p(x) make the simple polynomial x the primitive element. These polynomials are called primitive, and one exists for every degree. For example, x4 + x + 1 is primitive. So  = x is a primitive element and successive powers of  will generate all non-zero elements of GF(16). Example on next slide.

BCH CODES BCH codes are among the most widely used error-correcting codes The encoders of BCH codes are conventionally implemented by a linear feedback shift register (LFSR) architecture. BCH code with the following parameters: n = 2m − 1 n − k ≤ mt d min ≥ 2t + 1

Block Diagram for Modified BCH Encoding

Encoding circuit for a (n, k) BCH code

Three step implementation of BCH(255,233) Encoding

Improved Three Step Implementation of Bch(255,233)Encoding

Improved Three Step Implementation of Bch(255,233)Encoding

Step1 of a modified BCH encoding

Step-2 Of a Modified BCH Encoding

Step-3 of a modified BCH Encoding

An LFSR example, (b) 3-unfolded version of LFSR

Basic steps for simulating a design in ModelSim Create a working Library Compile Design files Load and Run simulation Debug Results

XILINX Implementation Design Flow Chart System Specifications Initial Concept Block Diagram Architecture Coding VHDL/Verilog Modeling Functional verification Simulation Generating net list Synthesis

Serial Implementation 1+y+y3+y5

Parellel Implementation 1+y+y3+y5

Thank you