Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system

被引:0
|
作者
Lee, Yuseop [1 ,2 ]
Kim, Jongsung [2 ,3 ]
Hong, Seokhie [1 ,2 ]
机构
[1] Korea Univ, Grad Sch Informat Management, Seoul 136075, South Korea
[2] Korea Univ, CIST, Seoul 136075, South Korea
[3] Kyungnam Univ, Dept E Business, Chang Won, South Korea
关键词
Side-channel attacks; HIGHT; Impossible collision; CRYPTANALYSIS;
D O I
10.1007/s11042-010-0590-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At CHES 2007, Biryukov and Knovratovich introduced a concept of side-channel attacks based on impossible collisions, and applied it to AES with reduced masked rounds. In this paper, we propose side-channel attacks on HIGHT (HIGh security and light weigHT) with the first 11, 12, 13 reduced masked rounds using impossible collision. Our best attacks on HIGHT with the first 11, 12 and 13 reduced masked rounds need 2(17), 2(32) and 2(40) chosen plaintexts and 2(23.6), 2(56.6) and 2(80.6) curve comparisons, respectively. They are the first known side-channel attacks on HIGHT with reduced masked rounds.
引用
收藏
页码:267 / 280
页数:14
相关论文
共 42 条
  • [31] Protection Against Side-Channel Attacks on Multifusion Zero-Permission Sensors using Differential Privacy
    Abdallah, Mina
    ElMougy, Amr
    2019 IEEE 44TH LOCAL COMPUTER NETWORKS (LCN) SYMPOSIUM ON EMERGING TOPICS IN NETWORKING (LCN SYMPOSIUM 2019), 2019, : 92 - 99
  • [32] Dual-Rail Active Protection System against Side-Channel Analysis in FPGAs
    He, Wei
    Jap, Dirmanto
    PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 64 - 65
  • [33] Assessment of Addition-Chain-Based Masked S-Box Using Deep-Learning-Based Side-Channel Attacks
    Li, Huizhong
    Ming, Jingdian
    Zhou, Yongbin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [34] Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm
    Kudo, Rei
    Sugawara, Takeshi
    Sakiyama, Kazuo
    Hara-Azumi, Yuko
    Li, Yang
    PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [35] Orthogonal Direct Sum Masking A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
    Bringer, Julien
    Carlet, Claude
    Chabanne, Herve
    Guilley, Sylvain
    Maghrebi, Houssem
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 40 - 56
  • [36] Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
    Hu, Chengyu
    Liu, Pengtao
    Zhou, Yongbin
    Guo, Shanqing
    Wang, Yilei
    Xu, Qiuliang
    SOFT COMPUTING, 2016, 20 (12) : 4919 - 4932
  • [37] Mitigating Cache-Based Side-Channel Attacks through Randomization: A Comprehensive System and Architecture Level Analysis
    Wang, Han
    Sayadi, Hossein
    Mohsenin, Tinoosh
    Zhao, Liang
    Sasan, Avesta
    Rafatirad, Setareh
    Homayoun, Houman
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 1414 - 1419
  • [38] Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
    Chengyu Hu
    Pengtao Liu
    Yongbin Zhou
    Shanqing Guo
    Yilei Wang
    Qiuliang Xu
    Soft Computing, 2016, 20 : 4919 - 4932
  • [39] Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks
    Selvam, Ravikumar
    Tyagi, Akhilesh
    CRYPTOGRAPHY, 2024, 8 (01)
  • [40] System Level Protection Against Side-Channel Attack Using High Performance Virtual Secure Circuit for Cryptographic Processor
    Madhavapandian, S.
    MaruthuPandi, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 2667 - 2677