Veriication of a Multiplier: 64 Bits and beyond Revised Supersedes 12 April Version Veriication of a Multiplier: 64 Bits and Beyond

نویسندگان

  • R. P. Kurshan
  • Leslie Lamport
چکیده

Verifying a 64-bit multiplier has a computational complexity that puts it beyond the grasp of current nite-state algorithms, including those based upon homomorphic reduction, the induction principle, and bdd xed-point algorithms. Theorem proving, while not bound by the same computational constraints, may not be feasible for routinely coping with the complex, low-level details of a real multiplier. We show how to verify such a multiplier by applying COSPAN, a model-checking algorithm, to verify local properties of the complex low-level circuit, and using TLP, a theorem prover based on the Temporal Logic of Actions, to prove that these properties imply the correctness of the multiplier. Both veriication steps are automated, and we plan to mechanize the translation between the languages of TLP and COSPAN.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verification of a Multiplier: 64 Bits and Beyond

Verifying a 64-bit multiplier has a computational complexity that puts it beyond the grasp of current finite-state algorithms, including those based upon homomorphic reduction, the induction principle, and bdd fixed-point algorithms. Theorem proving, while not bound by the same computational constraints, may not be feasible for routinely coping with the complex, low-level details of a real mult...

متن کامل

Veriication of Benchmarks 17 and 22 of the Ifip Wg10.5 Benchmark Circuit Suite

This paper reports on the veriication of two of the IFIP WG10.5 benchmarks | the multi-plier and systolic matrix multiplier. The circuit implementations are timed, detailed gate-level descriptions, and the speciication is given using the temporal logic TL n , a quaternary-valued temporal logic. A practical, integrated theorem-proving/model checking system based on the compositional theory for T...

متن کامل

A simple theorem prover based on symbolic trajectory evaluation and BDD's

Formalhardware veriication based on symbolic trajectory evaluation shows considerable promise in verifying medium to large scale VLSI designs with a high degree of automation. However, in order to verify today's designs, a method for composing partial veriication results is needed. One way of accomplishing this is to use a general purpose theorem prover to combine the veri-cation results obtain...

متن کامل

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

متن کامل

Design & Implementation of Fast Modulo Multiplier Based Network Intrusion Detection System (NIDS) using HDL

This paper covers the implementation of the implementation of Network Intrusion Detection System (NIDS) using International Data Encryption Algorithm (IDEA). The current era has seen an explosive growth in communications. Applications like online banking, personal digital assistants, mobile communication, smartcards, etc. have emphasized the need for security in resource constrained environment...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993