Network Working Group B. Han INTERNET-DRAFT H. Lee Intended Status: Standard Track H. Jeong Expires: December 26, 2011 Y. Won KISA June 24, 2011 The HIGHT Encryption Algorithm draft-kisa-hight-00 Abstract This document describes the HIGHT(HIGh security and light weigHT) encryption algorithm, which is suitable for low-resource device. HIGHT is a 64-bit block cipher with 128-bit keys. The algorithm consists of round functions, key schedule, encryption, and decryption. Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html Copyright and License Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents Han. et al. Expires December 26, 2011 [Page 1] INTERNET DRAFT The HIGHT Encryption Algorithm June 24, 2011 (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. HIGHT overview . . . . . . . . . . . . . . . . . . . . . . 3 2. Notation and Terminology . . . . . . . . . . . . . . . . . . . 3 3. The HIGHT algorithm . . . . . . . . . . . . . . . . . . . . . 4 3.1. Round functions . . . . . . . . . . . . . . . . . . . . . 4 3.2. Key schedule . . . . . . . . . . . . . . . . . . . . . . . 4 3.3. HIGHT encryption . . . . . . . . . . . . . . . . . . . . . 5 3.4. HIGHT Decryption . . . . . . . . . . . . . . . . . . . . . 5 3.5. HIGHT Object Identifiers . . . . . . . . . . . . . . . . . 7 4. Security Considerations . . . . . . . . . . . . . . . . . . . 7 5. Test Vectors . . . . . . . . . . . . . . . . . . . . . . . . . 8 6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10 6.1. Normative References . . . . . . . . . . . . . . . . . . . 10 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10 Han. et al. Expires December 26, 2011 [Page 2] INTERNET DRAFT The HIGHT Encryption Algorithm June 24, 2011 1 Introduction 1.1. HIGHT overview HIGHT is a 64-bit symmetric key light-weight block cipher suitable for low-resource device. HIGHT stands for 'HIGh security and light weigHT' and is developed by Korea 2005. HIGHT is a ISO/IEC international standard block cipher algorithm included in ISO/IEC 18033-3:2010 [ISO-HIGHT]. It has simple structure with use of basic arithmetic operation - XOR, addition/subtraction in modular 2**8, and circular shift rotation, and also without S-Box. The features of HIGHT are outlined as follows: - 64-bit input/output data block size - 128-bit key length - 32-round with XOR, modular addition, and shift rotation - No S-Box - Designed for low-resource device (data storage, power, etc.) 2. Notation and Terminology The following notation is used in the description of HIGHT encryption algorithm: [^] bitwise XOR [+] addition in modular 2**8 [-] subtraction in modular 2**8 || concatenation <<