HIGHT

HIGHT: A New Block Cipher Suitable for Low-Resource Device. In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra-light but also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires 3048 gates on 0.25 μm technology.


References in zbMATH (referenced in 43 articles )

Showing results 1 to 20 of 43.
Sorted by year (citations)

1 2 3 next

  1. Rishakani, Akbar Mahmoodi; Dehnavi, Seyed Mojtaba; Shamsabad, Mohmmadreza Mirzaee; Bagheri, Nasour: Cryptographic properties of cyclic binary matrices (2021)
  2. Sadeghi, Sadegh; Rijmen, Vincent; Bagheri, Nasour: Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK (2021)
  3. Kölbl, Stefan; Tischhauser, Elmar; Derbez, Patrick; Bogdanov, Andrey: Troika: a ternary cryptographic hash function (2020)
  4. Elenizi, Eman; Bani-Ata, Mashhour; Alrashed, Maryam H. A.: On a new cipher system over Galois fields of order 27 (2018)
  5. Hao, Yonglin; Meier, Willi: Truncated differential based known-key attacks on round-reduced SIMON (2017)
  6. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
  7. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Exploring energy efficiency of lightweight block ciphers (2016)
  8. Dutta, Avijit; Nandi, Mridul; Paul, Goutam: One-key compression function based MAC with security beyond birthday bound (2016)
  9. Lin, Li; Wu, Wenling; Zheng, Yafei: Automatic search for key-bridging technique: applications to LBlock and TWINE (2016)
  10. Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
  11. Luykx, Atul; Preneel, Bart; Tischhauser, Elmar; Yasuda, Kan: A MAC mode for lightweight block ciphers (2016)
  12. Tolba, Mohamed; Youssef, Amr M.: Generalized MitM attacks on full TWINE (2016)
  13. Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis: The \textscSimonand \textscSpeckblock ciphers on AVR 8-bit microcontrollers (2015)
  14. Karakoç, F.; Demirci, H.; Harmancı, A. E.: AKF: a key alternating Feistel scheme for lightweight cipher designs (2015)
  15. Wu, Wenling; Zhang, Lei; Yu, Xiaoli: The DBlock family of block ciphers (2015)
  16. Doröz, Yarkın; Shahverdi, Aria; Eisenbarth, Thomas; Sunar, Berk: Toward practical homomorphic evaluation of block ciphers using prince (2014) ioport
  17. Huang, Jialin; Lai, Xuejia: What is the effective key length for a block cipher: an attack on every practical block cipher (2014)
  18. Wen, Long; Wang, Meiqin; Bogdanov, Andrey; Chen, Huaifeng: Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard (2014)
  19. Wen, Long; Wang, Mei-Qin; Zhao, Jing-Yuan: Related-key impossible differential attack on reduced-round LBlock (2014) ioport
  20. Bogdanov, Andrey; Shibutani, Kyoji: Generalized Feistel networks revisited (2013)

1 2 3 next