Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system

被引:0
|
作者
Lee, Yuseop [1 ,2 ]
Kim, Jongsung [2 ,3 ]
Hong, Seokhie [1 ,2 ]
机构
[1] Korea Univ, Grad Sch Informat Management, Seoul 136075, South Korea
[2] Korea Univ, CIST, Seoul 136075, South Korea
[3] Kyungnam Univ, Dept E Business, Chang Won, South Korea
关键词
Side-channel attacks; HIGHT; Impossible collision; CRYPTANALYSIS;
D O I
10.1007/s11042-010-0590-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At CHES 2007, Biryukov and Knovratovich introduced a concept of side-channel attacks based on impossible collisions, and applied it to AES with reduced masked rounds. In this paper, we propose side-channel attacks on HIGHT (HIGh security and light weigHT) with the first 11, 12, 13 reduced masked rounds using impossible collision. Our best attacks on HIGHT with the first 11, 12 and 13 reduced masked rounds need 2(17), 2(32) and 2(40) chosen plaintexts and 2(23.6), 2(56.6) and 2(80.6) curve comparisons, respectively. They are the first known side-channel attacks on HIGHT with reduced masked rounds.
引用
收藏
页码:267 / 280
页数:14
相关论文
共 42 条
  • [21] Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
    Luo, Pei
    Fei, Yunsi
    Zhang, Liwei
    Ding, A. Adam
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [22] Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks
    Santoso, Bagus
    Oohama, Yasutada
    ENTROPY, 2019, 21 (05):
  • [23] Countermeasures for timing-based side-channel attacks against shared, modern computing hardware
    Montasari, Reza
    Hill, Richard
    Hosseinian-Far, Amin
    Montaseri, Farshad
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (03) : 294 - 320
  • [24] SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip
    Longo, J.
    De Mulder, E.
    Page, D.
    Tunstall, M.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 620 - 640
  • [25] Mutexion: Mutually Exclusive Compression System for Mitigating Compression Side-Channel Attacks
    Moon, Taegeun
    Kim, Hyoungshick
    Hyun, Sangwon
    ACM TRANSACTIONS ON THE WEB, 2022, 16 (04)
  • [26] Flexible parallel computing for elliptic curve scalar multiplication with resistance against simple side-channel attacks
    Wu K.
    Wu, Keke (wukk@sziit.edu.cn), 1600, Computer Society of the Republic of China (28): : 64 - 78
  • [27] Security Evaluations beyond Computing Power How to Analyze Side-Channel Attacks You Cannot Mount?
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 126 - 141
  • [28] A Two-Stage Out-Of-Box Method for Detecting Side-Channel Attacks in Cloud Computing
    Shi, Jiangyong
    Kuang, Ping
    Wang, Yongjun
    Yang, Yuexiang
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 148 - 153
  • [29] Secure Deduplication-Based Storage Systems With Resistance to Side-Channel Attacks via Fog Computing
    Lu, Youshui
    Qi, Yong
    Qi, Saiyu
    Zhang, Fuyou
    Wei, Wei
    Yang, Xu
    Zhang, Jingning
    Dong, Xinpei
    IEEE SENSORS JOURNAL, 2022, 22 (18) : 17529 - 17541
  • [30] Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks
    Imana, Jose L.
    Dhooghe, Siemen
    INFORMATION PROCESSING LETTERS, 2023, 182