Research Article
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher
Table 1
Summary of the attacks on HIGHT.
| Attack | #rounds | Complexities | References | Data | Time |
| Imp. Diff. | 18 | 246.8 CP | 2109.2 EN | [8] | Saturation | 22 | 262.04 CP | 2118.71 EN | [30] | Imp. Diff. | 25 | 260 CP | 2126.78 EN | [29] | Imp. Diff. | 26 | 261 CP | 2119.53 EN | [22] | Rel.-Key Rec. | 26 | 251.2 CP | 2120.41 EN | [28] | Rel.-Key Imp. | 28 | 260 CP | 2125.54 EN | [28] | Rel.-Key Imp. | 31 | 263 CP | 2127.28 EN | [29] | Rel.-Key Rec. for Weak. | 32 (full) | 257.84 CP | 2123.17EN | [31] | Biclique | 32 (full) | 248 CP | 2126.4 EN | [32] | DFA | 32 (full) | 12 faults | O(232) Com. + O(232) Mem. +22 seconds | [33] | AFA with HT | 32 (full) | 3 faults | 12572.26 seconds (≈3.49 Hours) | This paper |
|
|
Imp.: impossible, Diff.: differential, Rel.: related, Rec.: rectangle, Weak.: weak key, CP: chosen plaintext, EN: encryptions, Com.: computational, and Mem.: memory.
|