Abstract
At CHES 2007, Biryukov and Knovratovich introduced a concept of side-channel attacks based on impossible collisions, and applied it to AES with reduced masked rounds. In this paper, we propose side-channel attacks on HIGHT (HIGh security and light weigHT) with the first 11, 12, 13 reduced masked rounds using impossible collision. Our best attacks on HIGHT with the first 11, 12 and 13 reduced masked rounds need 217, 232 and 240 chosen plaintexts and 223.6, 256.6 and 280.6 curve comparisons, respectively. They are the first known side-channel attacks on HIGHT with reduced masked rounds.
Similar content being viewed by others
Notes
The preliminary version of this article in the CSA-09 proceedings only contain side-channel attacks on HIGHT with the first 11 reduced masked rounds.
References
Akkar ML, Bevan R, Goubin L (2004) Two power analysis attacks against one-mask methods. In: CHES 2004. LNCS, vol 3156. Springer, pp 332–347
Akkar ML, Goubin L (2003) A generic protection against high-order differential power analysis. In: FSE 2003. LNCS, vol 2887. Springer, pp 192–205
Biham E, Shamir A (1990) Differential cryptanalysis of des-like cryptosystems. J Cryptol 4(1):3–72. The extended abstract appears in Lecture notes in computer science. Advances in cryptology proceedings of CRYPTO’90, pp 2–21
Biham E, Biryukov A, Shamir A (1999) Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: EUROCRYPT 1999. LNCS, vol 1592. Springer, p 1223
Biham E, Dunkelman O, Keller N (2001) The rectangle attack—rectangling the serpent, advances in cryptology. In: Proceeding of EUROCRYPT 2001. LNCS, vol 2045. Springer, pp 340–357
Biham E, Dunkelman O, Keller N (2003) Differential-linear cryptanalysis of serpent. In: Proceedings of fast software encryption 10. LNCS, vol 2887. Springer, pp 9–21
Biryukov A, Khovratovich D (2007) Two new techniques of side-channel cryptanalysis. In: CHES 2007. LNCS, vol 4727. Springer, pp 195–208
Courtois NT, Goubin L (2006) An algebraic masking method to protect AES against power attacks. In: ICISC 2005. LNCS, vol 3935. Springer, pp 199–209
Handschuh H, Preneel B (2007) Blind differential cryptanalysis for enhanced power attacks. In: SAC 2006. LNCS, vol 4356. Springer, pp 163–173
Hong D, Sung J, Hong S, Lim J, Lee S, Koo BS, Lee C, Chang D, Lee J, Jeong K, Kim H, Kim J, Chee S (2006) HIGHT: a new block cipher suitable for low-resource device. In: CHES 2006. LNCS, vol 4249. Springer, pp 46–59
Kocher PC (1993) Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems. In: CRYPTO 1996. Springer, pp 104–113
Kocher PC, Jaffe J, Jun B (1999) Differential power analysis, advances in cryptology—CRYPTO 1999. In: LNCS, vol 1666. Springer, pp 388–397
Knudsen, LR (1995) Truncated and higher order differentials. In: FSE 1994, LNCS, vol 1008. Springer, pp 196–211
Matsui M (1994) Linear cryptanalysis method for DES cipher, advances in cryptology. In: Proceedings of EUROCRYPT 1993. LNCS, vol 765. Springer, pp 386–397
Author information
Authors and Affiliations
Corresponding author
Additional information
This work is supported by Kyungnam University Foundation Grant, 2010.
Rights and permissions
About this article
Cite this article
Lee, Y., Kim, J. & Hong, S. Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system. Multimed Tools Appl 56, 267–280 (2012). https://doi.org/10.1007/s11042-010-0590-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-010-0590-3