HIGHT: A New Block Cipher Suitable for Low-Resource Device

  • Deukjo Hong
  • Jaechul Sung
  • Seokhie Hong
  • Jongin Lim
  • Sangjin Lee
  • Bon-Seok Koo
  • Changhoon Lee
  • Donghoon Chang
  • Jesang Lee
  • Kitae Jeong
  • Hyun Kim
  • Jongsung Kim
  • Seongtaek Chee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4249)

Abstract

In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra-light but also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires 3048 gates on 0.25 μm technology.

Keywords

Block Cipher Ubiquitous Low-Resource Implementation 

References

  1. 1.
    National Institute of Standards and Technology (NIST), FIPS-197: Advanced Encryption Standard (November 2001), http://www.itl.nist.gov/fipspubs/
  2. 2.
    Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12–23. Springer, Heidelberg (1999)Google Scholar
  3. 3.
    Biham, E.: New Types of Cryptanalytic Attack Using Related Keys. Journal of Cryptology 7(4), 156–171 (1994)CrossRefGoogle Scholar
  4. 4.
    Biham, E., Dunkelman, O., Keller, N.: The Rectangle Attack – Rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 340–357. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Biham, E., Dunkelman, O., Keller, N.: New Results on Boomerang and Rectangle Attacks. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 1–16. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)MATHGoogle Scholar
  7. 7.
    Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245–257. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  8. 8.
    Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589–606. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. 9.
    Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267–287. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  10. 10.
    Daemen, J., Knudsen, L., Rijmen, V.: The Block Cipher SQUARE. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 149–165. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  11. 11.
    Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES Implementation on a Grain of Sand. IEEE Proceedings on Information Security 152(1), 13–20 (2005)CrossRefGoogle Scholar
  13. 13.
    Jakoben, T., Knudsen, L.R.: The Interpolation Attack against Block Ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28–40. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  14. 14.
    Kelsey, J., Kohno, T., Schneier, B.: Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 75–93. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  15. 15.
    Knudsen, L.R.: Truncated and Higher Order Differential. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 229–236. Springer, Heidelberg (1995)Google Scholar
  16. 16.
    Lucks, S.: The Saturation Attack – a Bait for Twofish. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, p. 1. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  17. 17.
    Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)Google Scholar
  18. 18.
    Matsui, M.: The First Experimental Cryptanalysis of DES. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 1–11. Springer, Heidelberg (1994)Google Scholar
  19. 19.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  20. 20.
    Wagner, D.: The Boomerang Attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156–170. Springer, Heidelberg (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Deukjo Hong
    • 1
  • Jaechul Sung
    • 2
  • Seokhie Hong
    • 1
  • Jongin Lim
    • 1
  • Sangjin Lee
    • 1
  • Bon-Seok Koo
    • 1
  • Changhoon Lee
    • 1
  • Donghoon Chang
    • 1
  • Jesang Lee
    • 1
  • Kitae Jeong
    • 1
  • Hyun Kim
    • 4
  • Jongsung Kim
    • 1
  • Seongtaek Chee
    • 3
  1. 1.Center for Information Security Technologies (CIST)Korea UniversitySeoulKorea
  2. 2.Department of MathematicsUniversity of SeoulSeoulKorea
  3. 3.National Security Research Institute (NSRI)DaejeonKorea
  4. 4.Korea Information Security Agency (KISA)SeoulKorea

Personalised recommendations