Yet Another Attack on Vest

نویسندگان

  • Pascal Delaunay
  • Antoine Joux
چکیده

We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM project (the European stream cipher project). The proposed attacks target the counter part of the ciphers, composed of 16 short-length nonlinear feedback shift registers (NLFSR) independently updated. Our aim is to retrieve the whole initial state of the counter (163 to 173 bits) which is a part of the keyed state. The first attack is directly adapted from previous works on differential side-channel attacks. The second attack is brand new. It involves a unique measurement thus it can be seen as a simple side-channel attack. However, it requires some signal processing so we call it Refined Simple Power Analysis. As we expect full recovery of the initial state with minimal complexity, one should carefully consider implementing any VEST cipher in an embedded device.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Overtaking VEST

VEST is a set of four stream cipher families submitted by S. O’Neil, B. Gittins and H. Landman to the eSTREAM call for stream cipher proposals of the European project ECRYPT. The state of any family member is made of three components: a counter, a counter diffusor and a core accumulator. We show that collisions can be found in the counter during the IV Setup. Moreover they can be combined with ...

متن کامل

VEST Enhanced Smart Cards

VEST is a modern cipher that can be readily deployed to offer increased efficiency and/or improved functionality in smartcards. VEST can also be deployed to assist prevent real world problems such as identity theft and the emulation and cloning of cards. VEST efficiently implements the essential symmetric cryptographic functions in one low-area, highperformance multi-function module. VEST-4 red...

متن کامل

A Study of the Usability of Ergonomic Camera Vest Based on Spirometry Parameters

Background: Being a cameraman is one of those occupations that expose people to musculoskeletal disorders (MSDs). Therefore, control measures should be taken to protect cameramen’s health. To solve the given problem, a vest was designed for cameramen to prevent MSDs by reducing the pressure and contact stress while carrying the camera on their shoulder. However, the usability of vest had ...

متن کامل

Rebuttal of overtaking VEST

VEST is a set of four stream cipher families targeted to semiconductor applications. All VEST family members support efficient encryption, single pass authenticated encryption, and collision resistant hashing in the one low area module. VEST was submitted by Synaptic Laboratories Ltd. to the ECRYPT NoE eSTREAM project in 2005. Recently, a single digit typographical error was identified in the V...

متن کامل

Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1

Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen Abstract: In 1988, Harn, Laih and Huang proposed a password authentication scheme based on quadratic residues. However, in 1995, Chang, Wu and Laih pointed out that if the parameters δ β α , , and λ are known by the intruder, this scheme can be broken. In this paper, we presented another attack on the Harn-Laih-Huang scheme. In our attack, it do...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008