Professional Documents
Culture Documents
Independent - Study by Sarang
Independent - Study by Sarang
Abstract—Pseudorandom bit sequence plays an important role high frequency pseudorandom signals, the spreaded output
when it comes to secured data transmission and storage. A pseu- appears almost like a noise and is being transmitted securely.
dorandom sequence is generated by a well defined mathematical
algorithm. A circuit which generates a pseudorandom sequence
is known as a pseudorandom sequence generator. A new method
for generating pseudorandom bits is mentioned in this paper
along with its VLSI architecture. The comparison of this method
with the current state of art is described and the simulation
results are given after making the architecture using a hardware
descriptive language.
I. INTRODUCTION
One of the major concern in various internet of things appli-
cations is the security of the data which is being transmitted. Fig. 1. Spread Spectrum Communication
The pseudorandom bit generator is an essential component
to manage user privacy in IoT enabled resource constraint Spread spectrum communication method finds its applica-
devices. Pseudorandom sequence can be used in the encryption tion in defense related communication where security of the
of the data which is being transmitted so that the transmission data being transmitted is of prime importance. At the receiver
of data is secure. The pseudorandom sequences have been side, the same pseudorandom sequence generator is used with
widely used in numerous essential areas such as information the same initial seed so that the same sequence is generated
security, telecommunications etc. A pseudorandom sequence and this is used in the recovery of the message signal from the
generator is nothing but a circuit with a well defined mathe- spreaded signal. This is called despreading of the signal. After
matical algorithm that produces a sequence that appears to be despreading, the original message signal is obtained back.
random and is indistinguishable from a real random sequence. The major focus of this paper is the formation of the
In order for a sequence to be accepted as a pseudorandom se- PN Sequence Generator block used in spread spectrum
quence, it should pass all the fifteen benchmark tests proposed communication. A new method for generation of PN sequence
by the National Institute of Standard and Technology (NIST). has been proposed along with its VLSI architecture [1] . The
Many of the previous methods either fails this tests or they main aim is to implement the VLSI architecture using a HDL
consume a larger hardware area or more latency is consumed. tool and to burn the code in a standard FPGA board and
The new method proposed is a modified version of coupled analyse the working of the PN generator.
linear congruential method [1]. The proposed method passes
all fifteen benchmark tests of NIST standard. It consumes A. Linear Congruential Generator
lesser hardware cost and clock latency is also reduced to a The major building block in the method proposed is a linear
single clock cycle. The length of the sequence generated is congruential generator, more commonly known as LCG [3].
also doubled compared to the previous method and also an An LCG is nothing but a mathematical algorithm for the
output bit is being generated in every clock cycle. synthesis of random sequence. The mathematical algorithm
for generating the sequence is given by
II. T HEORY
xi+1 = a × xi + b mod2n .
One of the major application of pseudorandom sequence Where xi+1 is the next number in the sequence, xi is the
is in the field of spread spectrum communication [2]. Spread current number in the sequence. ’a’ and ’b’ are constant
spectrum communication is used to transmit low frequency parameters and ’n’ is the total number of bits used. Initially,
data signals by spreading it with high frequency pseudorandom a number x0 is being given as input to the LCG and is called
signals. Pseudorandom signals have very high frequency and the initial seed. Depending upon the value of a, b, and initial
since it is having random nature, they appear almost like noise seed, the sequence obtained is different from one another. Even
signals. Therefore, after spreading the message signals with though Pseudorandom numbers appear to be non repetitive,
x0 y0
they are periodic with sufficiently large period. The maximum Start Start
xi+1 yi+1
x0 Start
MUX
CMP
xi <<
Bi
2r*xi
b1 b2 b1 b2
CMP CMP
Zi
0 0 0 1 0 1 bn-3
an-3
0 0 1 0 0 1 bn-4 2-bit
CMP
an-4
0 0 1 1 0 1
0 1 0 0 1 0
0 1 0 1 0 0
0 1 1 0 0 1
0 1 1 1 0 1 b7
a7
1 0 0 0 1 0 b6 2-bit 2-bit 2-bit
CMP CMP CMP
a6
1 0 0 1 1 0
b5
1 0 1 0 0 0 a5
2-bit
b4
1 0 1 1 0 1 a4 CMP
1 1 0 0 1 0 b3
a3
1 1 0 1 1 0 b2
2-bit 2-bit
CMP CMP
a2
1 1 1 0 1 0
b1
1 1 1 1 0 0 a1
2-bit
bo
CMP
a0
Table.1 Truth table of 2-bit comparator
Fig. 7. n-Bit Comparator
The overall expression of Abig and Bbig is obtained after
K-Map reduction.
0 0 0 0 0
Abig = a1 b1 + a1 b1 a0 b0 + a1 b1 a0 b0
0 0 0 0 0
Bbig = a1 b1 + a1 b1 a0 b0 + a1 b1 a0 b0 Carry save adder for addition of three n bit number has two
The gate level circuit of the expression for Abig and Bbig is parts.
shown in figure 6. The comparator gives an output Abig = 1
• n full adders in parallel. A bit of same weightage from
bi+1 each of the three input numbers is given to each full adder
Abig
stacked in parallel and the corresponding sum and carry
ai+1 of each full adder is passed to the second stage.
• The second stage is an n-1 bit ripple-carry adder which
bi receives sum and carry outputs from each of the full
Bbig adders stacked above.
ai
The detailed diagram of a carry save adder for computing
Fig. 6. 2-bit comparator addition of three four bit numbers is shown in figure 8. Unlike
a ripple carry adder, there is no carry chaining in carry save
and Bbig = 0 when 1st input number ’a’ is bigger than second adder. Carry Save Adder (CSA) eliminates the carry chaining
input number ’b’. The output is Abig = 0 and Bbig = 1 when by saving the carry and provides the carry to the next stage
b is greater than a. When both inputs have equal magnitude, of addition instead of adding it to the next higher bit adder.
then Abig = Bbig = 0. The output bit at each position is obtained by adding the
The formation of n bit comparator requires (n-1) 2-bit com- sum corresponding to that position with the carry obtained
parators - (n/2) 2-bit comparators in the first stage, (n/4) 2-bit from the previous position in the carry save stage with the
comparators in the second and goes on till we have a single overflow from the sum in the previous position in the ripple
two bit comparator in the last stage. i.e. 8-bit comparator carry stage. The area used for the carry save adder used for
requires 7 2-bit comparators. The detailed diagram is given n bit addition of three operands is given by:
in figure 7. The 2-bit comparators are connected such that A3C S A = (2n-1)AF A .
the one at the MSB is given the maximum priority. The
outputs of the 2-bit comparator from higher order bit in present Total area is contributed by n Full adders stacked in first
stage is being given at higher order input bits in the next stage. stage and (n-1) full adders used in second stage in ripple
This connection goes on till the final stage. This connection carry adder.
ensures proper comparison of n-bit numbers by giving more The critical path in the addition is obtained as nTF A
significance for the comparison of higher order bits. which is time taken to generate the MSB output bit, which
4) Carry save adder for 3 operand addition: Carry save is the delay of a single full adder in the first stage and (n-1)
adder is used to compute sum of three or more n-bit binary full adders in the ripple carry adder stage.
numbers. A carry save adder consists of a ladder of full adders.
cn-1 bn-1 an-1 cn-2 bn-2 an-2 cn-3 bn-3 an-3 c 1 b1 a 1 c0 b0 a0
FA FA FA FA FA
FA FA FA FA 0
sn sn-1 s2 s1 s0
III. R ESULTS
IV. C ONCLUSION
Since Bi and Ci is produced in each and every cycles, Zi
will be produced in each cycles. This is the major advantage
of this method compared to the previous method, because in
previous method output bits were not being generated for every
clock cycle. The overall bit length of the sequence is also
increased from approximately 2n−1 to 2n . The overall bit
length is increased compared to the previous method because
output Zi is produced for all clock cycle no matter what the
value of bit Ci is. The overall latency of previous method was
2n−1 clock cycles while the clock latency of this method is
only of that of a single clock cycle.
R EFERENCES
[1] A. K. Panda and K. C. Ray, “Modified dual-clcg method and its vlsi
architecture for pseudorandom bit generation,” IEEE Transactions on
Circuits and Systems I: Regular Papers, vol. 66, no. 3, pp. 989–1002,
2018.
[2] S. Pei and S. Gaoping, “Performance analysis of dsss system with
nonlinear fm jammer,” in 2010 Second International Conference on
Computer Modeling and Simulation, vol. 1. IEEE, 2010, pp. 88–91.
[3] R. S. Katti, R. G. Kavasseri, and V. Sai, “Pseudorandom bit generation
using coupled congruential generators,” IEEE Transactions on Circuits
and Systems II: Express Briefs, vol. 57, no. 3, pp. 203–207, 2010.