Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Cryptographic Hardware and Embedded Systems

CHES 2006: Cryptographic Hardware and Embedded Systems - CHES 2006 pp 46–59Cite as

  1. Home
  2. Cryptographic Hardware and Embedded Systems - CHES 2006
  3. Conference paper
HIGHT: A New Block Cipher Suitable for Low-Resource Device

HIGHT: A New Block Cipher Suitable for Low-Resource Device

  • Deukjo Hong18,
  • Jaechul Sung19,
  • Seokhie Hong18,
  • Jongin Lim18,
  • Sangjin Lee18,
  • Bon-Seok Koo18,
  • Changhoon Lee18,
  • Donghoon Chang18,
  • Jesang Lee18,
  • Kitae Jeong18,
  • Hyun Kim21,
  • Jongsung Kim18 &
  • …
  • Seongtaek Chee20 
  • Conference paper
  • 5306 Accesses

  • 319 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4249)

Abstract

In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra-light but also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires 3048 gates on 0.25 μm technology.

Keywords

  • Block Cipher
  • Ubiquitous
  • Low-Resource Implementation

This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment).

Chapter PDF

Download to read the full chapter text

References

  1. National Institute of Standards and Technology (NIST), FIPS-197: Advanced Encryption Standard (November 2001), http://www.itl.nist.gov/fipspubs/

  2. Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12–23. Springer, Heidelberg (1999)

    Google Scholar 

  3. Biham, E.: New Types of Cryptanalytic Attack Using Related Keys. Journal of Cryptology 7(4), 156–171 (1994)

    CrossRef  Google Scholar 

  4. Biham, E., Dunkelman, O., Keller, N.: The Rectangle Attack – Rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 340–357. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  5. Biham, E., Dunkelman, O., Keller, N.: New Results on Boomerang and Rectangle Attacks. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 1–16. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  6. Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)

    MATH  Google Scholar 

  7. Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245–257. Springer, Heidelberg (1999)

    CrossRef  Google Scholar 

  8. Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589–606. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  9. Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267–287. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  10. Daemen, J., Knudsen, L., Rijmen, V.: The Block Cipher SQUARE. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 149–165. Springer, Heidelberg (1997)

    CrossRef  Google Scholar 

  11. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  12. Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES Implementation on a Grain of Sand. IEEE Proceedings on Information Security 152(1), 13–20 (2005)

    CrossRef  Google Scholar 

  13. Jakoben, T., Knudsen, L.R.: The Interpolation Attack against Block Ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28–40. Springer, Heidelberg (1997)

    CrossRef  Google Scholar 

  14. Kelsey, J., Kohno, T., Schneier, B.: Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 75–93. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  15. Knudsen, L.R.: Truncated and Higher Order Differential. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 229–236. Springer, Heidelberg (1995)

    Google Scholar 

  16. Lucks, S.: The Saturation Attack – a Bait for Twofish. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, p. 1. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  17. Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)

    Google Scholar 

  18. Matsui, M.: The First Experimental Cryptanalysis of DES. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 1–11. Springer, Heidelberg (1994)

    Google Scholar 

  19. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    CrossRef  Google Scholar 

  20. Wagner, D.: The Boomerang Attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156–170. Springer, Heidelberg (1999)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Center for Information Security Technologies (CIST), Korea University, Seoul, Korea

    Deukjo Hong, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong & Jongsung Kim

  2. Department of Mathematics, University of Seoul, Seoul, Korea

    Jaechul Sung

  3. National Security Research Institute (NSRI), 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-350, Korea

    Seongtaek Chee

  4. Korea Information Security Agency (KISA), 78 Karak-dong, Songpa-gu, Seoul, 138-160, Korea

    Hyun Kim

Authors
  1. Deukjo Hong
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Jaechul Sung
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Seokhie Hong
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Jongin Lim
    View author publications

    You can also search for this author in PubMed Google Scholar

  5. Sangjin Lee
    View author publications

    You can also search for this author in PubMed Google Scholar

  6. Bon-Seok Koo
    View author publications

    You can also search for this author in PubMed Google Scholar

  7. Changhoon Lee
    View author publications

    You can also search for this author in PubMed Google Scholar

  8. Donghoon Chang
    View author publications

    You can also search for this author in PubMed Google Scholar

  9. Jesang Lee
    View author publications

    You can also search for this author in PubMed Google Scholar

  10. Kitae Jeong
    View author publications

    You can also search for this author in PubMed Google Scholar

  11. Hyun Kim
    View author publications

    You can also search for this author in PubMed Google Scholar

  12. Jongsung Kim
    View author publications

    You can also search for this author in PubMed Google Scholar

  13. Seongtaek Chee
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Versailles Saint-Quentin-en-Yvelines University, 45 Avenue des Etats-Unis, 78035, Versailles Cedex, France

    Louis Goubin

  2. Information Technology R&D Center, Mitsubishi Electric Corporation, 5-1-1 Ofuna Kamakura Kanagawa, Japan

    Mitsuru Matsui

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hong, D. et al. (2006). HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems - CHES 2006. CHES 2006. Lecture Notes in Computer Science, vol 4249. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11894063_4

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11894063_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46559-1

  • Online ISBN: 978-3-540-46561-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature