310 likes | 374 Vues
Learn the basics of transitioning from VHDL to Verilog through an introductory tutorial series. Explore key concepts including HDL notation, differences between VHDL and Verilog, Verilog types, operators, and built-in gates. Gain insight into entity instantiation, combinatorial and sequential logic, and test bench essentials for simulation in Verilog. Enhance your understanding with practical examples and code snippets to accelerate your Verilog learning journey.
E N D
An Introduction to Verilog: Transitioning from VHDL Tutorial 1
Lesson Plan (Tentative) • Week 1: Transitioning from VHDL to Verilog, Introduction to Cryptography • Week 2: A5 Cipher Implementaion, Transitioning from Verilog to Verilog-A • Week 3: Verilog-A Mixer Analysis
Purpose of HDL Languages • Simplify design so you can concentrate on the overall picture • HDL allows description in language rather than schematic, speeding up development time • Allows reuse of components (standard cells ie libraries)
VHDL/Verilog Differences • Verilog modelled after C, VHDL is modelled after Ada • VHDL is more strongly typed (ie it checks the typing more rigorously) • Verilog is case sensitive while VHDL is not • This means that VHDL has a higher learning curve than Verilog, but with proficiency, offers more flexibility. • Verilog used extensively in the US while VHDL is used internationally
Verilog Types • wire, wire[msb:lsb] (single/multiple bit wire) • reg, reg[msb:lsb] (single/multiple bit register) • integer (integer type, 32 bits) • time (unsigned 64 bit) • real (floating point double) • string
Operators Arithmetic: • Binary +, -, *, /, % (mod) • Unary +, - (sign) Relational • Binary <, >, <=, >=
Operators (con’t) Equivalence Operators • === (equivalence including x and z), ==, !== (again including x and z), != Bit-wise Operators • ~ (not), & (and), | (or), ^ (xor), ~^, ^~ (xnor)
Operators (con’t) • Shift Operators <<, >> • Cocatenation {a, b, c} • Replication {n{m}} (m n times) • Conditional cond_exp ? True_exp : false_exp
Built in gates • Can be used without having to build • and, nand, or, nor, xor, xnor (n-input gates), used as:and (out, in1, in2, in3, …) • buf, bufif1, bufif0, not, notif1, notif0 (transmission gates/tristates)
No equivalent of architecture keyword in Verilog (all is treated as one architecture) VHDL: entity myentity is port ( a, b : in std_logic; c : out std_logic); end myentity; Architecture implementation of myentity --do stuff end implementation; Verilog: module myentity (a, b, c); input a, b; output c; wire a, b, c; //do stuff endmodule Entity Instantiation
Component Instantiation • Verilog doesn’t require explicit instantiation VHDL: component DFF port( d : in std_logic; q : out std_logic); end component; MyDff : DFF Port map (foo, bar); --implicit Port map (d => foo, q => bar);--explicit Verilog: dff u0 (foo, bar); //implicit dff u0 (.foo(d), .bar(q)); //explicit
Combinational Assignment • Note that gate level primitives in Verilog can be a function or bitwise symbol VHDL: a <= b; a <= b AND c; a <= b + c; Verilog: a <= b; //parallel assignment and(a, b, c); //a is output a <= b & c; //same as line above {carry, sum} <= b + c; //carry is //optional
Flow Logic (I): Case • Differentiation in VHDL for select statements and conditional assignment; none in Verilog VHDL: With std_logic_vector’(A) select Q <= “1” when “0” <= “0” when “1” <= “0” when others; • VHDL can also use case statements similar to Verilog Verilog: case (A) 0 : Q <= 1; 1 : Q <= 0; default : Q <= 0; endcase
Flow Logic (II): If/Then/Else • Equivalence operators similar to C in Verilog VHDL: Q <= ‘1’ when A = ‘1’ else ‘0’ when B = ‘1’ else ‘0’; Verilog: if (A == 1) begin Q <= 1; end else if (B == 1) begin Q <= 0; end else begin Q <= 0; end
Combinational Processes VHDL: process (a) begin b <= a; end process; Verilog: always @ (a) begin b <= a; end
Sequential Logic • Example: D Flip Flop: (note edge triggering is in always statement in Verilog) VHDL: process(clk) begin if rising_edge(clk) q <= d; end if; End process; Verilog: always @ (posedge clk) begin q <= d; end
Test Benches • Useful for simulation and verification • Keyword “initial begin .. end” starts a testbench • Remember “always begin .. end” • #delay is used to delay by delay ‘time units’ • $display(“Random text”) displays Random text • `timescale sets the ‘time unit’ unit
Test Benches • $monitor (“Clk %b, Reg %d”, clk, reg) displays clock and register variables as binary and decimal respectively • #delay $finish runs the testbench for delay ‘time units’
//Asynchronous Reset 4-bit //Counter module counter (clk, reset, enable, count); input clk, reset, enable; wire clk, reset, enable; output count; reg[3:0] count; always @ (reset) //change to //posedge clk for sync reset begin if (reset == 1) begin count <= 0; end end always @ (posedge clk) begin if (enable == 1) begin count <= count + 1; end end endmodule 4-bit Counter Code
Example: `timescale 1ns/1ns module counter_tb; reg clk, reset, enable; wire [3:0] count; counter U0 ( .clk (clk), .reset (reset), .enable (enable), .count (count) ); initial begin clk = 0; reset = 0; enable = 0; end always #5 clk = !clk; //flip clock every 5 ns initial begin $dumpfile ( "counter.vcd" ); $dumpvars; end initial begin $display( "\t\ttime,\tclk,\treset,\tenable,\tcount" ); $monitor( "%d,\t%b,\t%b,\t%b,\t%d" ,$time, clk,reset,enable,count); end initial #100 $finish; //ends after 100 ns endmodule Testbench for Counter
Tutorial 1 Part 2 Introduction to Cryptography
Cryptography is Everywhere • Internet (online banking, e-commerce sites) • Cell phones (GSM and CDMA) • Other wireless devices (PDAs and laptops with wireless cards) • RFIDs, sensors
Why Hardware Design is important in Cryptography • Many cryptographic applications are hardware-based (cell phones, RFID, wireless router technology, electronic key dongles) • Importance of hardware design knowledge to efficiently implement applications in cryptography
Scenario O A B A wants to communicate with B, however O can listen in on the conversation. How to prevent this?
Types of Cryptographic Ciphers • A cipher is a way of making messages unreadable • Two main categories: public key and private/symmetric key • Public key uses different keys for encryption and decryption (which means not having to exchange keys in person), but is computationally expensive • Symmetric key uses the same key for encryption and decryption, but is relatively cheap in terms of computation power
Types of Cryptographic Ciphers • Examples of Public Key Cryptography: RSA, Diffie-Hellman key exchange, ECC (Elliptic Curve Cryptography) • Examples of Symmetric Key Cryptography: RC4 (used in WEP), A5 (used in GSM), DES and Triple-DES (used in banking applications)
Linear Feedback Shift Registers (LFSRs) • Used in many stream ciphers (a subset of symmetric key ciphers that outputs 1 bit at a time; they’re quick, but less secure than block ciphers) • Consists of a chain of D Flip Flops and a set of XORs that feed later bits back into the beginning
Practical Example of a cipher: A5 • Used in GSM communications as an encryption scheme • Consists of 3 LFSRs combined to produce a single stream of bits • Details were kept secret; people reverse-engineered the cipher to produce the structure • There have been many attacks since it was reverse engineered and is now considered broken
Summary • Cryptography is used in many everyday applications • Hardware knowledge important to implement efficient ciphers • LFSRs important to implement stream ciphers • A5-1 (GSM) an application of LFSRs