Skip to main content
Log in

Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

At CHES 2007, Biryukov and Knovratovich introduced a concept of side-channel attacks based on impossible collisions, and applied it to AES with reduced masked rounds. In this paper, we propose side-channel attacks on HIGHT (HIGh security and light weigHT) with the first 11, 12, 13 reduced masked rounds using impossible collision. Our best attacks on HIGHT with the first 11, 12 and 13 reduced masked rounds need 217, 232 and 240 chosen plaintexts and 223.6, 256.6 and 280.6 curve comparisons, respectively. They are the first known side-channel attacks on HIGHT with reduced masked rounds.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. The preliminary version of this article in the CSA-09 proceedings only contain side-channel attacks on HIGHT with the first 11 reduced masked rounds.

References

  1. Akkar ML, Bevan R, Goubin L (2004) Two power analysis attacks against one-mask methods. In: CHES 2004. LNCS, vol 3156. Springer, pp 332–347

  2. Akkar ML, Goubin L (2003) A generic protection against high-order differential power analysis. In: FSE 2003. LNCS, vol 2887. Springer, pp 192–205

  3. Biham E, Shamir A (1990) Differential cryptanalysis of des-like cryptosystems. J Cryptol 4(1):3–72. The extended abstract appears in Lecture notes in computer science. Advances in cryptology proceedings of CRYPTO’90, pp 2–21

    Google Scholar 

  4. Biham E, Biryukov A, Shamir A (1999) Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: EUROCRYPT 1999. LNCS, vol 1592. Springer, p 1223

  5. Biham E, Dunkelman O, Keller N (2001) The rectangle attack—rectangling the serpent, advances in cryptology. In: Proceeding of EUROCRYPT 2001. LNCS, vol 2045. Springer, pp 340–357

  6. Biham E, Dunkelman O, Keller N (2003) Differential-linear cryptanalysis of serpent. In: Proceedings of fast software encryption 10. LNCS, vol 2887. Springer, pp 9–21

  7. Biryukov A, Khovratovich D (2007) Two new techniques of side-channel cryptanalysis. In: CHES 2007. LNCS, vol 4727. Springer, pp 195–208

  8. Courtois NT, Goubin L (2006) An algebraic masking method to protect AES against power attacks. In: ICISC 2005. LNCS, vol 3935. Springer, pp 199–209

  9. Handschuh H, Preneel B (2007) Blind differential cryptanalysis for enhanced power attacks. In: SAC 2006. LNCS, vol 4356. Springer, pp 163–173

  10. Hong D, Sung J, Hong S, Lim J, Lee S, Koo BS, Lee C, Chang D, Lee J, Jeong K, Kim H, Kim J, Chee S (2006) HIGHT: a new block cipher suitable for low-resource device. In: CHES 2006. LNCS, vol 4249. Springer, pp 46–59

  11. Kocher PC (1993) Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems. In: CRYPTO 1996. Springer, pp 104–113

  12. Kocher PC, Jaffe J, Jun B (1999) Differential power analysis, advances in cryptology—CRYPTO 1999. In: LNCS, vol 1666. Springer, pp 388–397

  13. Knudsen, LR (1995) Truncated and higher order differentials. In: FSE 1994, LNCS, vol 1008. Springer, pp 196–211

  14. Matsui M (1994) Linear cryptanalysis method for DES cipher, advances in cryptology. In: Proceedings of EUROCRYPT 1993. LNCS, vol 765. Springer, pp 386–397

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jongsung Kim.

Additional information

This work is supported by Kyungnam University Foundation Grant, 2010.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, Y., Kim, J. & Hong, S. Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system. Multimed Tools Appl 56, 267–280 (2012). https://doi.org/10.1007/s11042-010-0590-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-010-0590-3

Keywords

Navigation