A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Power Analysis Attacks of Modular Exponentiation in Smartcards
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Galois LFSR, embedded devices and side channel weaknesses
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Successfully attacking masked AES hardware implementations
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Differential power analysis of stream ciphers
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Hi-index | 0.00 |
We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM project (the European stream cipher project). The proposed attacks target the counter part of the ciphers, composed of 16 short-length nonlinear feedback shift registers (NLFSR) independently updated. Our aim is to retrieve the whole initial state of the counter (163 to 173 bits) which is a part of the keyed state. The first attack is directly adapted from previous works on differential side-channel attacks. The second attack is brand new. It involves a unique measurement thus it can be seen as a simple side-channel attack. However, it requires some signal processing so we call it Refined Simple Power Analysis. As we expect full recovery of the initial state with minimal complexity, one should carefully consider implementing any VEST cipher in an embedded device.