Formal verification of a pipelined cryptographic circuit using equivalence checking and completion functions

被引:0
|
作者
Lam, Chiu Hong [1 ]
Aagaard, Mark D. [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In formal hardware verification, equivalence checking is often used but is unable to verify a pipelined circuit against a non-pipelined one. Without sophisticated optimizations such as structural matching, equivalence checkers can also run into state-space explosion problems. A solution is to supplement equivalence checking with the verification strategy or completion functions. In this work, three pipelined register-transfer-level implementations of the KASUMI cryptographic circuit were verified against a non-pipelined one. Our work established a practical method for constructing these completion functions efficiently in hardware description languages. At the trade-off of increased verification effort, the completion functions approach enables equivalence checking to handle both pipelined and non-pipelined circuits, and it can localize a bug into a pipeline stage.
引用
收藏
页码:1401 / 1404
页数:4
相关论文
共 50 条
  • [21] Formal verification of a pipelined processor with new memory hierarchy using a commercial model checker
    Nakamura, H
    Arai, T
    Fujita, M
    2002 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2002, : 321 - 324
  • [22] Logic circuit equivalence checking using Haar spectral coefficients and partial BDDs
    Thornton, MA
    Drechsler, R
    Günther, W
    VLSI DESIGN, 2002, 14 (01) : 53 - 64
  • [23] Formal Verification of Heuristic Autonomous Intersection Management Using Statistical Model Checking
    Chouhan, Aaditya Prakash
    Banda, Gourinath
    SENSORS, 2020, 20 (16) : 1 - 25
  • [24] Formal specification and security verification of the IDKE protocol using FDR model checking
    Soltwisch, R
    Tegeler, F
    Hogrefe, D
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334
  • [25] Memory models for the formal verification of assembler code using bounded model checking
    Ecker, W
    Esen, V
    Steininger, T
    Zambaldi, M
    SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, : 129 - 135
  • [26] Formal Verification of ALICA Multi-agent Plans Using Model Checking
    Thao Nguyen Van
    Fredivianus, Nugroho
    Huu Tam Tran
    Geihs, Kurt
    Thi Thanh Binh Huynh
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2018), 2018, : 351 - 358
  • [27] Formal verification using bounded model checking: SAT versus sequential ATPG engines
    Saab, DG
    Abraham, JA
    Vedula, VM
    16TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS, 2003, : 243 - 248
  • [28] Formal Verification for Node-Based Visual Scripts Using Symbolic Model Checking
    Hasegawa, Isamu
    Yokogawa, Tomoyuki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (01) : 78 - 91
  • [29] Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique
    Borrelli, Antonio
    Di Lucca, Giuseppe Antonio
    Nardone, Vittoria
    Santone, Antonella
    2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2019, : 249 - 254
  • [30] Formal Modelling and Verification of a Component Model using Coloured Petri Nets and Model Checking
    Oliveira, Elthon
    Almeida, Hyggo
    Silva, Leandro
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1427 - +