HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit-level algebraic fault analysis (AFA) of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once the HT is activated. The HT is realized by merely 4 registers and with an extremely low activation rate of about 0.000025. We show that the optimal location for inserting the designed HT can be efficiently determined by AFA in advance. Finally, a method is proposed to represent the cipher and the injected faults with a merged set of algebraic equations and the master key can be recovered by solving the merged equation system with an SAT solver. Our attack, which fully recovers the secret master key of the cipher in 12572.26 seconds, requires three times of activation on the designed HT. To the best of our knowledge, this is the first Trojan attack on HIGHT.
from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2kNvc64
via IFTTT
Εγγραφή σε:
Σχόλια ανάρτησης (Atom)
Δημοφιλείς αναρτήσεις
-
Abstract Recent updating of the World Health Organization (WHO) classification of central nervous system (CNS) tumors in 2016 demonstrates...
-
In our previous work, the dichloromethane-methanol (1:1 v/v) extract, fractions and isolated compounds from Polyscias fulva stem bark showed...
-
Background Agricultural work can expose workers to increased risk of heat strain and volume depletion due to repeated exposures to high ambi...
-
Cincinnati.com No fooling; go get your head (and neck) examined for free Cincinnati.com Thursday, get your head examined. UC Health ...
-
Nursing students' perceptions of a video-based serious game's educational value: A pilot study. Nurse Educ Today. 2017 Dec 28;...
-
Anaphora is a rhetorical term for the repetition of a word or phrase at the beginning of successive clauses or verses. from #AlexandrosSfa...
-
Abstract We introduce a novel diagnostic Visual Voiding Device (VVD), which has the ability to visually document urinary voiding events an...
-
Method combines radiomics with three - compartment breast image analysis of dual - energy mammography (Source: The Doctors Lounge - Oncology...
-
Cone beam computerized tomography (CBCT) has been widely used in dental implanting. However, the local hospitals usually don’t have access t...
Δεν υπάρχουν σχόλια:
Δημοσίευση σχολίου