{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:37Z","timestamp":1740149017947,"version":"3.37.3"},"reference-count":32,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"],"award-info":[{"award-number":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"],"award-info":[{"award-number":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"],"award-info":[{"award-number":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"],"award-info":[{"award-number":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"],"award-info":[{"award-number":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology on Communication Security Laboratory","award":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"],"award-info":[{"award-number":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"]}]},{"name":"Major State Basic Research Development Program (973 Plan) of China","award":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"],"award-info":[{"award-number":["61272491","61309021","61472357","61571063","CSC201606325012","9140C110602150C11053","2013CB338004"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit-level algebraic fault analysis (AFA) of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once the HT is activated. The HT is realized by merely 4 registers and with an extremely low activation rate of about 0.000025. We show that the optimal location for inserting the designed HT can be efficiently determined by AFA in advance. Finally, a method is proposed to represent the cipher and the injected faults with a merged set of algebraic equations and the master key can be recovered by solving the merged equation system with an SAT solver. Our attack, which fully recovers the secret master key of the cipher in 12572.26 seconds, requires three times of activation on the designed HT. To the best of our knowledge, this is the first Trojan attack on HIGHT.<\/jats:p>","DOI":"10.1155\/2017\/8051728","type":"journal-article","created":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T19:14:08Z","timestamp":1513797248000},"page":"1-15","source":"Crossref","is-referenced-by-count":4,"title":["Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher"],"prefix":"10.1155","volume":"2017","author":[{"given":"Hao","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China"},{"name":"Science and Technology on Communication Security Laboratory, Chengdu 610041, China"}]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6087-8243","authenticated-orcid":true,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Chengdu 610041, China"},{"name":"Zhejiang University, Yuquan Campus, Hangzhou 310027, China"},{"name":"School of Computing, National University of Singapore, Singapore 117417"}]},{"given":"Xinjie","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of North Electronic Equipment, Beijing 100191, China"}]},{"given":"Wei","family":"He","sequence":"additional","affiliation":[{"name":"Central Research Institute, Huawei Pte Ltd., Singapore 117674"}]},{"given":"Lumin","family":"Xu","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Chengdu 610041, China"}]},{"given":"Yunfei","family":"Ma","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2005.861395"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71641-9_3"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/11604938_19"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_4"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/652187"},{"issue":"22","key":"14","first-page":"226","year":"2013","journal-title":"Information Security Journal: A Global Perspective"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2196252"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052259"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_17"},{"issue":"1","key":"19","first-page":"29","volume":"6","year":"2012","journal-title":"International Journal of Security and Its Applications"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2339854"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_7"},{"journal-title":"Cryptology ePrint Archive","year":"2012","key":"22"},{"journal-title":"Cryptology ePrint Archive","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/251853"},{"year":"2009","key":"26"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76788-6_2"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02620-1_7"},{"key":"31","first-page":"49","volume-title":"Related-Key Attack on the Full HIGHT","volume":"6829","year":"2011"},{"key":"32","first-page":"365","volume-title":"Biclique Attack on the Full HIGHT","volume":"7259","year":"2012"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-4516-2_41"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88403-3_14"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224335"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16342-5_29"},{"volume-title":"Gr\u00f6bner Bases","year":"2007","series-title":"Applications in Cryptology","key":"42"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88757-9"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_7"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/8051728.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/8051728.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/8051728.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T19:14:23Z","timestamp":1513797263000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/8051728\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":32,"alternative-id":["8051728","8051728"],"URL":"https:\/\/doi.org\/10.1155\/2017\/8051728","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2017]]}}}