HIGHT: A New Block Cipher Suitable for Low-Resource Device. In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra-light but also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires 3048 gates on 0.25 μm technology.

References in zbMATH (referenced in 23 articles )

Showing results 1 to 20 of 23.
Sorted by year (citations)

1 2 next

  1. Tolba, Mohamed; Youssef, Amr M.: Generalized MitM attacks on full TWINE (2016)
  2. Karakoç, F.; Demirci, H.; Harmancı, A.E.: AKF: a key alternating Feistel scheme for lightweight cipher designs (2015)
  3. Wu, Wenling; Zhang, Lei; Yu, Xiaoli: The DBlock family of block ciphers (2015)
  4. Huang, Jialin; Lai, Xuejia: What is the effective key length for a block cipher: an attack on every practical block cipher (2014)
  5. Wen, Long; Wang, Meiqin; Bogdanov, Andrey; Chen, Huaifeng: Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard (2014)
  6. Wen, Long; Wang, Mei-Qin; Zhao, Jing-Yuan: Related-key impossible differential attack on reduced-round LBlock (2014)
  7. Bogdanov, Andrey; Shibutani, Kyoji: Generalized Feistel networks revisited (2013)
  8. Eisenbarth, Thomas; Gong, Zheng; Güneysu, Tim; Heyse, Stefan; Indesteege, Sebastiaan; Kerckhof, Stéphanie; Koeune, François; Nad, Tomislav; Plos, Thomas; Regazzoni, Francesco; Standaert, François-Xavier; van Oldeneel tot Oldenzeel, Loic: Compact implementation and performance evaluation of block ciphers in ATtiny devices (2012)
  9. Karakoç, Ferhat; Demirci, Hüseyin; Harmancı, A.Emre: Combined differential and linear cryptanalysis of reduced-round PRINTcipher (2012)
  10. Minier, Marine; Naya-Plasencia, María: A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock (2012)
  11. Ågren, Martin; Johansson, Thomas: Linear cryptanalysis of printcipher -- trails and samples everywhere (2011)
  12. Leander, Gregor; Abdelraheem, Mohamed Ahmed; AlKhzaimi, Hoda; Zenner, Erik: A cryptanalysis of PRINTcipher: the invariant subspace attack (2011)
  13. Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San: Side-channel resistant crypto for less than 2,300 GE (2011)
  14. Shibutani, Kyoji: On the diffusion of generalized Feistel structures regarding differential and linear cryptanalysis (2011)
  15. Wei, Lei; Rechberger, Christian; Guo, Jian; Wu, Hongjun; Wang, Huaxiong; Ling, San: Improved meet-in-the-middle cryptanalysis of KTANTAN (poster) (2011)
  16. Yasuda, Kan: A new variant of PMAC: beyond the birthday bound (2011)
  17. Badel, Stéphane; Dağtekin, Nilay; Nakahara, Jorge jun.; Ouafi, Khaled; Reffé, Nicolas; Sepehrdad, Pouyan; Sušil, Petr; Vaudenay, Serge: ARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware (2010)
  18. Paar, Christof; Pelzl, Jan: Understanding cryptography. A textbook for students and practitioners. Foreword by Bart Preneel. (2010)
  19. Waluyo, Agustinus Borgy; Pek, Isaac; Chen, Xiang; Yeoh, Wee-Soon: Design and evaluation of lightweight middleware for personal wireless body area network (2009)
  20. Bogdanov, Andrey; Leander, Gregor; Paar, Christof; Poschmann, Axel; Robshaw, Matt J.B.; Seurin, Yannick: Hash functions and RFID tags: mind the gap (2008)

1 2 next