Paper 2005/413

VEST Hardware-Dedicated Stream Ciphers

Sean O'Neil, Benjamin Gittins, and Howard A. Landman

Abstract

VEST ciphers are based on bijective non-linear parallel feedback shift registers assisted by non-linear Residue Number System (RNS) based counters. Four VEST cipher family trees are introduced: 80-bit secure VEST-4, 128-bit secure VEST-8, 160-bit secure VEST-16 and 256-bit secure VEST-32. VEST ciphers return 4 to 32 bits of output per clock cycle while occupying ~5K to ~22K ASIC gates including the finite state machine logic overhead. All VEST ciphers support family keying, variable key sizes and instant re-keying. VEST ciphers are designed exploiting all the advantages of ASIC and FPGA hardware offering high-speed encryption with very low latency and substantial performance improvements comparing with general-purpose or software ciphers implemented in the same area.

Metadata
Available format(s)
-- withdrawn --
Category
Secret-key cryptography
Publication info
Published elsewhere. posted on ECRYPT, not published previously
Keywords
stream ciphershash functionsauthenticated encryptionmessage digestMACmessage authentication codefastest hardware cipherNLFSRparallel feedbackRNSresidue number system
Contact author(s)
sean @ cryptolib com
History
2007-04-03: withdrawn
2005-11-21: received
See all versions
Short URL
https://ia.cr/2005/413
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.