The security of HIGHT block cipher under integral attack was studied. Firstly
the flaw in the existing results on building the distinguisher was corrected. And a new 11-round integral distinguisher of HIGHT was built. Based on this new distinguisher
a 17-round multiple-integral distinguisher was built. By using the 17-round distinguisher
25-round in-tegral attack on HIGHT was proposed based on the principle of time memory trade-off
with the data
time and memory complexity of 2
62.92
2
66.20
and 2
119
respectively. The results show that the attack was better than results before on the number of round and time complexity.
关键词
Keywords
references
HONG D , SUNG J , HONG S , et al . HIGHT: a new block cipher suit-able for low-resource device [C ] // Cryptographic Hardware and Em-bedded Systems - CHES 2006 . c 2006 : 46 - 59 .
ZHANG P , SUN B , LI C . Saturation attack on the block cipher HIGHT [C ] // The 8th International Conference on Cryptology and Network Security . c 2009 : 76 - 86 .
KOO B , HONG D , KWON D . Related-key attack on the full HIGHT [C ] // Information Security and Cryptology - ICISC 2010 . c 2010 : 49 - 67 .
KOO B , HONG D , KWON D . Biclique attack on the full HIGHT [C ] // Information Security and Cryptology - ICISC 2011 . c 2011 : 365 - 374 .
CHEN J , WANG M , PRENEEL B . Impossible differential cryptanaly-sis of the lightweight block ciphers TEA, XTEA and HIGHT [C ] // AF-RICACRYPT 2012 . c 2012 : 117 - 137 .
IGARASHI Y , SUEYOSHI R , KANEKO T , et al . Meet-in-the-middle attack with splice-and-cut technique on the 19-round variant of block cipher HIGHT [J ] . Infromation Science and Applications , 2015 , 339 : 423 - 429 .
FAN W J , WU W L , ZHANG L . Differential fault analysis on HIGHT [J ] . Journal of Graduate University of Chinese Academy of Science . 2012 , 29 ( 2 ): 271 - 276 .
CHEN H , WANG T , ZHANG F , et al . Algebraic fault analysis of HIGHT [J ] . Journal of Shanghai Jiaotong University , 2015 , 49 ( 12 ): 1817 - 1825 .
KNUDSEN L , WAGNER D . Integral cryptanalysis [C ] // FSE 2002 . Leuven, Belgium , c 2002 : 112 - 127 .
MINER M , PHAN R W , POUSSE B . On integral distinguishers of rijndael family of ciphers [J ] . Cryptologia , 2012 , 36 ( 2 ): 104 - 118 .
YU S , LEI W . Meet-in-the-middle technique for integral attacks against feistel ciphers [C ] // Selected Areas in Cryptography 2012 . c 2012 : 234 - 251 .
YI W , CHEN S . Integral cryptanalysis of the block cipher E2 [EB/OL ] . http://arxiv.org/pdf/1404.6100.pdf http://arxiv.org/pdf/1404.6100.pdf .
YI W , CHEN S . Improved results on integral and zero-correlation linear cryptanalysis of the block cipher MIBS [EB/OL ] . http://arxiv.org/pdf/1404.6100.pdf http://arxiv.org/pdf/1404.6100.pdf .