Stealthy hardware trojan based algebraic fault analysis of hight block cipher
H Chen, T Wang, F Zhang, X Zhao… - Security and …, 2017 - Wiley Online Library
H Chen, T Wang, F Zhang, X Zhao, W He, L Xu, Y Ma
Security and Communication Networks, 2017•Wiley Online LibraryHIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In
this paper, we present a bit‐level algebraic fault analysis (AFA) of HIGHT, where the faults
are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is
able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once
the HT is activated. The HT is realized by merely 4 registers and with an extremely low
activation rate of about 0.000025. We show that the optimal location for inserting the …
this paper, we present a bit‐level algebraic fault analysis (AFA) of HIGHT, where the faults
are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is
able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once
the HT is activated. The HT is realized by merely 4 registers and with an extremely low
activation rate of about 0.000025. We show that the optimal location for inserting the …
HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit‐level algebraic fault analysis (AFA) of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once the HT is activated. The HT is realized by merely 4 registers and with an extremely low activation rate of about 0.000025. We show that the optimal location for inserting the designed HT can be efficiently determined by AFA in advance. Finally, a method is proposed to represent the cipher and the injected faults with a merged set of algebraic equations and the master key can be recovered by solving the merged equation system with an SAT solver. Our attack, which fully recovers the secret master key of the cipher in 12572.26 seconds, requires three times of activation on the designed HT. To the best of our knowledge, this is the first Trojan attack on HIGHT.
Showing the best result for this search. See all results