Abstract
We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM project (the European stream cipher project). The proposed attacks target the counter part of the ciphers, composed of 16 short-length non-linear feedback shift registers (NLFSR) independently updated. Our aim is to retrieve the whole initial state of the counter (163 to 173 bits) which is a part of the keyed state. The first attack is directly adapted from previous works on differential side-channel attacks. The second attack is brand new. It involves a unique measurement thus it can be seen as a simple side-channel attack. However, it requires some signal processing so we call it Refined Simple Power Analysis. As we expect full recovery of the initial state with minimal complexity, one should carefully consider implementing any VEST cipher in an embedded device.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, D., Archambeault, B., Rao, J., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Fischer, W., Gammel, B.M., Kniffler, O., Velten, J.: Differential Power Analysis of Stream Ciphers. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 257–270. Springer, Heidelberg (2006)
Gittins, B., Landman, H., O’Neil, S., Kelson, R.: VEST, a presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates (2005)
Goubin, L.: A refined power analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 199–210. Springer, Heidelberg (2002)
Joux, A., Delaunay, P.: Galois LFSR, Embedded Devices and Side Channel Weaknesses. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 436–451. Springer, Heidelberg (2006)
Joux, A., Reinhard, J.-R.: Overtaking Vest. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 60–75. Springer, Heidelberg (2007)
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Koç, Ç.K., Naccache, D., Paar, C. (eds.): CHES 2001. LNCS, vol. 2162. Springer, Heidelberg (2001)
Paar, C., Koç, Ç.K. (eds.): CHES 2000. LNCS, vol. 1965. Springer, Heidelberg (2000)
Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism. In: The State of the Art of Stream Ciphers (2004)
Mangard, S., Pramstaller, N., Oswald, E.: Successfully Attacking Masked AES Hardware Implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157–171. Springer, Heidelberg (2005)
Messerges, T., Dabbish, E., Sloan, R.: Power analysis on modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144–157. Springer, Heidelberg (1999)
O’Neil, S., Gittins, B., Landman, H.: VEST. Hardware-Dedicated Stream Ciphers (2005)
Ors, S.B., Oswald, E., Preneel, B.: Power-analysis attacks on an FPGA - first experimental results. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 35–50. Springer, Heidelberg (2003)
Rechberger, C., Oswald, E.: Stream ciphers and side channel analysis. In: SASC 2004, pp. 320–327 (2004)
Rechberger, C.: Side Channel Analysis of Stream Ciphers. Master’s thesis, Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Delaunay, P., Joux, A. (2008). Yet Another Attack on Vest. In: Vaudenay, S. (eds) Progress in Cryptology – AFRICACRYPT 2008. AFRICACRYPT 2008. Lecture Notes in Computer Science, vol 5023. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68164-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-68164-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68159-5
Online ISBN: 978-3-540-68164-9
eBook Packages: Computer ScienceComputer Science (R0)