Advertisement

Yet Another Attack on Vest

  • Pascal Delaunay
  • Antoine Joux
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5023)

Abstract

We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM project (the European stream cipher project). The proposed attacks target the counter part of the ciphers, composed of 16 short-length non-linear feedback shift registers (NLFSR) independently updated. Our aim is to retrieve the whole initial state of the counter (163 to 173 bits) which is a part of the keyed state. The first attack is directly adapted from previous works on differential side-channel attacks. The second attack is brand new. It involves a unique measurement thus it can be seen as a simple side-channel attack. However, it requires some signal processing so we call it Refined Simple Power Analysis. As we expect full recovery of the initial state with minimal complexity, one should carefully consider implementing any VEST cipher in an embedded device.

Keywords

Side Channel Attacks VEST Stream Ciphers Fourier Transform 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Agrawal, D., Archambeault, B., Rao, J., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)Google Scholar
  3. 3.
    Fischer, W., Gammel, B.M., Kniffler, O., Velten, J.: Differential Power Analysis of Stream Ciphers. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 257–270. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Gittins, B., Landman, H., O’Neil, S., Kelson, R.: VEST, a presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates (2005)Google Scholar
  5. 5.
    Goubin, L.: A refined power analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 199–210. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Joux, A., Delaunay, P.: Galois LFSR, Embedded Devices and Side Channel Weaknesses. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 436–451. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Joux, A., Reinhard, J.-R.: Overtaking Vest. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 60–75. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  8. 8.
    Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)Google Scholar
  9. 9.
    Koç, Ç.K., Naccache, D., Paar, C. (eds.): CHES 2001. LNCS, vol. 2162. Springer, Heidelberg (2001)zbMATHGoogle Scholar
  10. 10.
    Paar, C., Koç, Ç.K. (eds.): CHES 2000. LNCS, vol. 1965. Springer, Heidelberg (2000)zbMATHGoogle Scholar
  11. 11.
    Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism. In: The State of the Art of Stream Ciphers (2004)Google Scholar
  12. 12.
    Mangard, S., Pramstaller, N., Oswald, E.: Successfully Attacking Masked AES Hardware Implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157–171. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  13. 13.
    Messerges, T., Dabbish, E., Sloan, R.: Power analysis on modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144–157. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  14. 14.
    O’Neil, S., Gittins, B., Landman, H.: VEST. Hardware-Dedicated Stream Ciphers (2005)Google Scholar
  15. 15.
    Ors, S.B., Oswald, E., Preneel, B.: Power-analysis attacks on an FPGA - first experimental results. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 35–50. Springer, Heidelberg (2003)Google Scholar
  16. 16.
    Rechberger, C., Oswald, E.: Stream ciphers and side channel analysis. In: SASC 2004, pp. 320–327 (2004)Google Scholar
  17. 17.
    Rechberger, C.: Side Channel Analysis of Stream Ciphers. Master’s thesis, Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Pascal Delaunay
    • 1
    • 2
  • Antoine Joux
    • 2
    • 3
  1. 1.THALES Land and Joint SystemColombesFrance
  2. 2.Université de Versailles Saint-Quentin-en-YvelinesVersailles CedexFrance
  3. 3.DGA 

Personalised recommendations