Yet Another Attack on Vest
نویسندگان
چکیده
We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM project (the European stream cipher project). The proposed attacks target the counter part of the ciphers, composed of 16 short-length nonlinear feedback shift registers (NLFSR) independently updated. Our aim is to retrieve the whole initial state of the counter (163 to 173 bits) which is a part of the keyed state. The first attack is directly adapted from previous works on differential side-channel attacks. The second attack is brand new. It involves a unique measurement thus it can be seen as a simple side-channel attack. However, it requires some signal processing so we call it Refined Simple Power Analysis. As we expect full recovery of the initial state with minimal complexity, one should carefully consider implementing any VEST cipher in an embedded device.
منابع مشابه
Overtaking VEST
VEST is a set of four stream cipher families submitted by S. O’Neil, B. Gittins and H. Landman to the eSTREAM call for stream cipher proposals of the European project ECRYPT. The state of any family member is made of three components: a counter, a counter diffusor and a core accumulator. We show that collisions can be found in the counter during the IV Setup. Moreover they can be combined with ...
متن کاملVEST Enhanced Smart Cards
VEST is a modern cipher that can be readily deployed to offer increased efficiency and/or improved functionality in smartcards. VEST can also be deployed to assist prevent real world problems such as identity theft and the emulation and cloning of cards. VEST efficiently implements the essential symmetric cryptographic functions in one low-area, highperformance multi-function module. VEST-4 red...
متن کاملA Study of the Usability of Ergonomic Camera Vest Based on Spirometry Parameters
Background: Being a cameraman is one of those occupations that expose people to musculoskeletal disorders (MSDs). Therefore, control measures should be taken to protect cameramen’s health. To solve the given problem, a vest was designed for cameramen to prevent MSDs by reducing the pressure and contact stress while carrying the camera on their shoulder. However, the usability of vest had ...
متن کاملRebuttal of overtaking VEST
VEST is a set of four stream cipher families targeted to semiconductor applications. All VEST family members support efficient encryption, single pass authenticated encryption, and collision resistant hashing in the one low area module. VEST was submitted by Synaptic Laboratories Ltd. to the ECRYPT NoE eSTREAM project in 2005. Recently, a single digit typographical error was identified in the V...
متن کاملYet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen Abstract: In 1988, Harn, Laih and Huang proposed a password authentication scheme based on quadratic residues. However, in 1995, Chang, Wu and Laih pointed out that if the parameters δ β α , , and λ are known by the intruder, this scheme can be broken. In this paper, we presented another attack on the Harn-Laih-Huang scheme. In our attack, it do...
متن کامل