Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system

被引:0
|
作者
Lee, Yuseop [1 ,2 ]
Kim, Jongsung [2 ,3 ]
Hong, Seokhie [1 ,2 ]
机构
[1] Korea Univ, Grad Sch Informat Management, Seoul 136075, South Korea
[2] Korea Univ, CIST, Seoul 136075, South Korea
[3] Kyungnam Univ, Dept E Business, Chang Won, South Korea
关键词
Side-channel attacks; HIGHT; Impossible collision; CRYPTANALYSIS;
D O I
10.1007/s11042-010-0590-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At CHES 2007, Biryukov and Knovratovich introduced a concept of side-channel attacks based on impossible collisions, and applied it to AES with reduced masked rounds. In this paper, we propose side-channel attacks on HIGHT (HIGh security and light weigHT) with the first 11, 12, 13 reduced masked rounds using impossible collision. Our best attacks on HIGHT with the first 11, 12 and 13 reduced masked rounds need 2(17), 2(32) and 2(40) chosen plaintexts and 2(23.6), 2(56.6) and 2(80.6) curve comparisons, respectively. They are the first known side-channel attacks on HIGHT with reduced masked rounds.
引用
收藏
页码:267 / 280
页数:14
相关论文
共 42 条
  • [1] Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system
    Yuseop Lee
    Jongsung Kim
    Seokhie Hong
    Multimedia Tools and Applications, 2012, 56 : 267 - 280
  • [2] DES with any reduced masked rounds is not secure against side-channel attacks
    Kim, Jongsung
    Lee, Yuseop
    Lee, Sangjin
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 347 - 354
  • [3] Side-Channel Attacks on Masked Bitsliced Implementations of AES
    Radulescu, Anca
    Choudary, Marios O.
    CRYPTOGRAPHY, 2022, 6 (03)
  • [4] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [5] Improved Side-Channel Attack on DES with the First Four Rounds Masked
    Kim, Jongsung
    Hong, Seokhie
    Han, Dong-Guk
    Lee, Sangjin
    ETRI JOURNAL, 2009, 31 (05) : 625 - 627
  • [6] Shuffling Across Rounds: A Lightweight Strategy To Counter Side-channel Attacks
    Patranabis, Sikhar
    Roy, Debapriya Basu
    Vadnala, Praveen Kumar
    Mukhopadhyay, Debdeep
    Ghosh, Santosh
    PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 440 - 443
  • [7] Quantitative Verification of Masked Arithmetic Programs Against Side-Channel Attacks
    Gao, Pengfei
    Xie, Hongyi
    Zhang, Jun
    Song, Fu
    Chen, Taolue
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PT I, 2019, 11427 : 155 - 173
  • [8] Preventing and Detecting Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis A.
    Kifayat, Kashif
    Hussain, Abir
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [9] Automated Software Protection for the Masses Against Side-Channel Attacks
    Belleville, Nicolas
    Courousse, Damien
    Heydemann, Karine
    Charles, Henri-Pierre
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 15 (04)
  • [10] Masked SABL: A Long Lasting Side-Channel Protection Design Methodology
    Fadaeinia, Bijan
    Hasan Anik, Md Toufiq
    Karimi, Naghmeh
    Moradi, Amir
    IEEE ACCESS, 2021, 9 : 90455 - 90464