Design circuit to encrypt passwords

Assignment Help Basic Computer Science
Reference no: EM133300772

1. You have been hired by a company to design a circuit to encrypt passwords. Assume passwords are 3 bits in size and that the encrypted password is the original password inverted (0's become 1's and 1's become 0's) and then add 3 (modulo 8 as we only have 3 bits). For example if the password is 000, we invert it to give us 111. We then add 3 (7 + 3 = 10 mod 8 = 2) which makes the encrypted password 010. Design and build a sequential circuit (using the procedure from your notes) using 3 T flip-flops to perform the above function. You need to show the State Table, K-maps and draw the sequential circuit.

2. Using D flip-flops, implement a 3-bit register with one external input (x). When the external input x = 0, the registers should rotate to the left by 1 bit, and when the external input x = 1, the value in the register should increase by 1. When creating your State Table, please put the flip-flop values before the external input (i.e., D2 D1 D0 x). See the example on Pages 14-17 of Module 4, Topic 3 (marks will be deducted if you use a different ordering in your State Table). You need to show the State Table, K-maps and draw the sequential circuit (see Pages 14-17 of Module 4, Topic 3).

3. Redo the Vending Machine Example from Module 5, Topic 1 (pp. 20-25) assuming that the cost of gum is 20 cents. Also, use T flip-flops instead of D flip-flops as was used in the example from the lecture notes. You need to show the State Diagram, State Table, K-maps and draw the sequential circuit.

4. Consider the following combinational circuits: (i) F1 (x,y,z) =Σ(1,2,5,6) F2 (x,y,z) = Σ(1,3) F3 (x,y,z) = Σ(0,4,7) (ii) F1 (w,x,y,z) = Σ(0,4,6,10,12,14) F2 (w,x,y,z) = Σ(2,3,4,8,11,15) F3 (w,x,y,z) = Σ(0,2,9,13) F4 (w,x,y,z) = Σ(10,11,14,15) a) Implement Part (i) using a ROM chip (be sure to specify the size). b) Implement Part (ii) using a ROM chip (be sure to specify the size). c) Implement Part (i) using a 16x4 ROM.

5. Consider a RAM chip with a capacity of 32M words of 8 bits each. a) How many address and data lines are required for this chip? b) How many 32M x 8 RAM chips would be required to construct an 128M x 16 RAM chip? c) How many address and data lines are required for an 128M x 16 RAM chip? d) What size decoder is needed to construct an 128M x 16 chip from 32M x 8 chips? e) Draw a diagram of the 128M x 16 chip built from 32M x 8 chips. Include the range of addresses for each chip.

Reference no: EM133300772

Questions Cloud

Create an event for indian wedding : Create an event for indian wedding. Describe the location, transportation, parking, venue atmosphere, size and room capacity of venue, other facilities.
Discuss european communities integration between members : Group of answer choices enlargement (expansion) of the European Communities and economic integration between members. immigration and terrorism
Discuss was environmental laws : The law I chose to discuss was minimum wage requirements. The FLSA provides that a minimum wage must be paid to cover nonexempt employees.
Identify a hazard event that could affect home community : Identify a hazard event that could affect your home community, but most residents might not consider a hazard worth planning for.
Design circuit to encrypt passwords : You have been hired by a company to design a circuit to encrypt passwords. You need to show the State Table, K-maps and draw the sequential circuit.
Explain golden nugget : From his lecture, what ONE golden nugget stands out to you and why. Where in the video (what minute/second) does he explain this golden nugget?
Make ibd for air defense system : The UAVs can communicate between each other or between itself and the control center. Make an IBD for the air defense system.
Organization information security environment : List and define two dynamic factors that are likely to shift in an organization's information security environment.
Appropriateness of demand-based pricing : Do you like pricing that fluctuates based on demand variables as opposed to standard pricing? The practice of using variable or dynamic pricing is growing.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd