Research Article

Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

Table 1

Summary of the attacks on HIGHT.

Attack#rounds ComplexitiesReferences
DataTime

Imp. Diff.18246.8 CP2109.2 EN[8]
Saturation22262.04 CP2118.71 EN[30]
Imp. Diff.25260 CP 2126.78 EN[29]
Imp. Diff.26261 CP 2119.53 EN[22]
Rel.-Key Rec.26251.2 CP2120.41 EN[28]
Rel.-Key Imp.28260 CP2125.54 EN[28]
Rel.-Key Imp.31263 CP2127.28 EN[29]
Rel.-Key Rec. for Weak.32 (full)257.84 CP 2123.17EN[31]
Biclique32 (full)248 CP2126.4 EN[32]
DFA32 (full)12 faults O(232) Com. + O(232) Mem. +22 seconds[33]
AFA with HT32 (full)3 faults 12572.26 seconds (≈3.49 Hours) This paper

Imp.: impossible, Diff.: differential, Rel.: related, Rec.: rectangle, Weak.: weak key, CP: chosen plaintext, EN: encryptions, Com.: computational, and Mem.: memory.