2017
DOI: 10.1155/2017/8051728
|View full text |Cite
|
Sign up to set email alerts
|

Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

Abstract: HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit-level algebraic fault analysis (AFA) of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once the HT is activated. The HT is realized by merely 4 registers and with an extremely low activation rate of about 0.000025. We show that the opti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 34 publications
1
9
0
Order By: Relevance
“…Therefore, it is practically impossible to activate such sequential HT during functional testing. Such challenge was also noted in Chen et al 38 and Wang et al 39 and signifies the importance of detecting this type of HTs. If the HT causes one bit of the key to be leaked, then the entire key requires 64 HT activations.…”
Section: Methodssupporting
confidence: 53%
See 3 more Smart Citations
“…Therefore, it is practically impossible to activate such sequential HT during functional testing. Such challenge was also noted in Chen et al 38 and Wang et al 39 and signifies the importance of detecting this type of HTs. If the HT causes one bit of the key to be leaked, then the entire key requires 64 HT activations.…”
Section: Methodssupporting
confidence: 53%
“…Untrusted third‐party might insert an HT in the IP. Electronic design automation (EDA) tools. An infected EDA tool could insert an HT by modifying the logic in the pre‐place, post‐place, or route netlists 38 A rogue employee in the chip development team. …”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Reference [33] presents HT-based algebraic fault analysis (AFA) of a lightweight block cipher HIGHT. HIGHT is one of the lightweight encryption algorithms that is considered for implementation in an IoT.…”
Section: Hardware Trojan Based Side-channel Attacksmentioning
confidence: 99%