In this paper we show that highly-parallel hardware is not necessary: our attack uses a single FPGA for breaking KeeLoq when using a 48-bit random seed in 17 hours using a mid-range Virtex-4, and less than 3 hours using a high-end Virtex-6 chip. We achieve these results using a combination of algorithmic improvements, FPGA design methodology, and Xilinx-specific features.
Category / Keywords: secret-key cryptography / Date: received 15 May 2011 Contact author: yash at eng tau ac il Available format(s): PDF | BibTeX Citation Version: 20110518:022503 (All versions of this report) Short URL: ia.cr/2011/242 Discussion forum: Show discussion | Start new discussion