International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

VEST Hardware-Dedicated Stream Ciphers

Authors:
Sean O'Neil
Benjamin Gittins
Howard A. Landman
Download:
URL: http://eprint.iacr.org/2005/413
Search ePrint
Search Google
Abstract: VEST ciphers are based on bijective non-linear parallel feedback shift registers assisted by non-linear Residue Number System (RNS) based counters. Four VEST cipher family trees are introduced: 80-bit secure VEST-4, 128-bit secure VEST-8, 160-bit secure VEST-16 and 256-bit secure VEST-32. VEST ciphers return 4 to 32 bits of output per clock cycle while occupying ~5K to ~22K ASIC gates including the finite state machine logic overhead. All VEST ciphers support family keying, variable key sizes and instant re-keying. VEST ciphers are designed exploiting all the advantages of ASIC and FPGA hardware offering high-speed encryption with very low latency and substantial performance improvements comparing with general-purpose or software ciphers implemented in the same area.
BibTeX
@misc{eprint-2005-12746,
  title={VEST Hardware-Dedicated Stream Ciphers},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / stream ciphers, hash functions, authenticated encryption, message digest, MAC, message authentication code, fastest hardware cipher, NLFSR, parallel feedback, RNS, residue number system},
  url={http://eprint.iacr.org/2005/413},
  note={posted on ECRYPT, not published previously sean@cryptolib.com 13606 received 17 Nov 2005, last revised 21 Nov 2005, withdrawn 3 Apr 2007},
  author={Sean O'Neil and Benjamin Gittins and Howard A. Landman},
  year=2005
}