HIGHT
HIGHT: A New Block Cipher Suitable for Low-Resource Device. In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra-light but also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires 3048 gates on 0.25 μm technology.
Keywords for this software
References in zbMATH (referenced in 45 articles )
Showing results 1 to 20 of 45.
Sorted by year (- Baicheva, Tsonka; Topalova, Svetlana: On the diffusion of the improved generalized Feistel (2022)
- Rishakani, Akbar Mahmoodi; Dehnavi, Seyed Mojtaba; Shamsabad, Mohmmadreza Mirzaee; Bagheri, Nasour: Cryptographic properties of cyclic binary matrices (2021)
- Sadeghi, Sadegh; Rijmen, Vincent; Bagheri, Nasour: Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK (2021)
- Tan, Lin; Zhu, Xuanyong; Qi, Wenfeng: Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles (2021)
- Kölbl, Stefan; Tischhauser, Elmar; Derbez, Patrick; Bogdanov, Andrey: Troika: a ternary cryptographic hash function (2020)
- Elenizi, Eman; Bani-Ata, Mashhour; Alrashed, Maryam H. A.: On a new cipher system over Galois fields of order 27 (2018)
- Hao, Yonglin; Meier, Willi: Truncated differential based known-key attacks on round-reduced SIMON (2017)
- Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
- Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Exploring energy efficiency of lightweight block ciphers (2016)
- Dutta, Avijit; Nandi, Mridul; Paul, Goutam: One-key compression function based MAC with security beyond birthday bound (2016)
- Lin, Li; Wu, Wenling; Zheng, Yafei: Automatic search for key-bridging technique: applications to LBlock and TWINE (2016)
- Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
- Luykx, Atul; Preneel, Bart; Tischhauser, Elmar; Yasuda, Kan: A MAC mode for lightweight block ciphers (2016)
- Tolba, Mohamed; Youssef, Amr M.: Generalized MitM attacks on full TWINE (2016)
- Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis: The \textscSimonand \textscSpeckblock ciphers on AVR 8-bit microcontrollers (2015)
- Karakoç, F.; Demirci, H.; Harmancı, A. E.: AKF: a key alternating Feistel scheme for lightweight cipher designs (2015)
- Wu, Wenling; Zhang, Lei; Yu, Xiaoli: The DBlock family of block ciphers (2015)
- Doröz, Yarkın; Shahverdi, Aria; Eisenbarth, Thomas; Sunar, Berk: Toward practical homomorphic evaluation of block ciphers using prince (2014) ioport
- Huang, Jialin; Lai, Xuejia: What is the effective key length for a block cipher: an attack on every practical block cipher (2014)
- Wen, Long; Wang, Meiqin; Bogdanov, Andrey; Chen, Huaifeng: Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard (2014)