Research Article
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher
Table 4
Statistics of solutions corresponds to different
under mode A and mode B.
| | Mode A (with a distinguisher) | Mode B (without a distinguisher) | N = 9 | N = 8 | N = 7 | N = 6 | N = 5 | N = 4 | N = 3 | N = 9 | N = 8 | N = 7 | N = 6 | N = 5 | N = 4 | N = 3 |
| (25, 0) | 1 | 1 | 1 | 1 | 1 | 1 | – | 8.24 | 8.48 | 8.64 | 8.96 | 9.44 | 11.74 | – | (25, 1) | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 16.76 | 17.55 | 18.58 | 21.33 | 26.40 | 264.47 | 9660.49 | (25, 2) | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 2.12 | 2.40 | 2.66 | 2.78 | 3.20 | 3.93 | 2654.37 | (25, 3) | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 34.74 | 34.82 | 35.66 | 36.57 | 39.31 | 55.77 | 5782.57 | (25, 4) | 1 | 1 | 1 | 1 | 1 | 1 | – | 8.32 | 8.48 | 8.96 | 8.96 | 10.88 | 21.69 | – |
|
|