Formal verification of a pipelined cryptographic circuit using equivalence checking and completion functions

被引:0
|
作者
Lam, Chiu Hong [1 ]
Aagaard, Mark D. [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In formal hardware verification, equivalence checking is often used but is unable to verify a pipelined circuit against a non-pipelined one. Without sophisticated optimizations such as structural matching, equivalence checkers can also run into state-space explosion problems. A solution is to supplement equivalence checking with the verification strategy or completion functions. In this work, three pipelined register-transfer-level implementations of the KASUMI cryptographic circuit were verified against a non-pipelined one. Our work established a practical method for constructing these completion functions efficiently in hardware description languages. At the trade-off of increased verification effort, the completion functions approach enables equivalence checking to handle both pipelined and non-pipelined circuits, and it can localize a bug into a pipeline stage.
引用
收藏
页码:1401 / 1404
页数:4
相关论文
共 50 条
  • [1] Formal Verification of Pipelined Cryptographic Circuits: A Functional Approach
    Bitat, Abir
    Merniz, Salah
    INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2021, 45 (04): : 583 - 591
  • [2] Formal Verification of Pipelined Cryptographic Circuits: A Functional Approach
    Bitat A.
    Merniz S.
    Informatica (Slovenia), 2021, 45 (04): : 583 - 591
  • [3] Combining equivalence verification and completion functions
    Aagaard, MD
    Ciubotariu, VC
    Higgins, JT
    Khalvati, F
    FORMAL METHODS IN COMPUTER-AIDED DESIGN, PROCEEDINGS, 2004, 3312 : 98 - 112
  • [4] Combining equivalence verification and completion functions
    Aagaard, MD
    Ciubotariu, VC
    Higgins, JT
    Khalvati, F
    FORMAL METHODS IN COMPUTER-AIDED DESIGN, 2004, 3312 : 98 - 112
  • [5] Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
    Lai, Li-Chang
    Liu, Jiaxiang
    Shi, Xiaomu
    Tsai, Ming-Hsien
    Wang, Bow-Yaw
    Yang, Bo-Yin
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 377 - 395
  • [6] Formal Verification of Executable Complementation and Equivalence Checking for Buchi Automata
    Brunner, Julian
    INTEGRATED FORMAL METHODS, IFM 2020, 2020, 12546 : 239 - 256
  • [7] Formal Verification of Code Motion Techniques Using Data-Flow-Driven Equivalence Checking
    Karfa, Chandan
    Mandal, Chittaranjan
    Sarkar, Dipankar
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2012, 17 (03)
  • [8] Retiming verification using sequential equivalence checking
    Kahne, Brian
    Abadir, Magdy
    MTV 2005: SIXTH INTERNATIONAL WORKSHOP ON MICROPRESSOR TEST AND VERIFICATION: COMMON CHALLENGES AND SOLUTIONS, PROCEEDINGS, 2006, : 138 - +
  • [9] Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols
    Bolignano, D
    COMPUTER AIDED VERIFICATION, 1998, 1427 : 77 - 87
  • [10] Using Logic Synthesis and Circuit Reasoning for Equivalence Checking
    Fan, Quanrun
    Pan, Feng
    Duan, Xindong
    ADVANCED MANUFACTURING SYSTEMS, PTS 1-3, 2011, 201-203 : 836 - 840