<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-pham-cfrg-hiae-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="HiAE">The HiAE Authenticated Encryption Algorithm</title>
    <seriesInfo name="Internet-Draft" value="draft-pham-cfrg-hiae-05"/>
    <author initials="F." surname="Denis" fullname="Frank Denis">
      <organization>Fastly Inc.</organization>
      <address>
        <email>fd@00f.net</email>
      </address>
    </author>
    <author initials="P." surname="Pham" fullname="Phuong Pham">
      <organization>Huawei</organization>
      <address>
        <email>pham.phuong@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Prabel" fullname="Lucas Prabel">
      <organization>Huawei</organization>
      <address>
        <email>lucas.prabel@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Sun" fullname="Shuzhou Sun">
      <organization>Huawei</organization>
      <address>
        <email>sunshuzhou@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="13"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 167?>

<t>This document describes HiAE, a high-throughput authenticated encryption algorithm designed for next-generation wireless systems (6G) and high-speed data transmission applications.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/hiae-aead/draft-pham-hiae"/>.</t>
    </note>
  </front>
  <middle>
    <?line 171?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The evolution of wireless networks toward 6G, alongside the growing demands of cloud service providers and CDN operators, requires cryptographic algorithms capable of delivering unprecedented throughput while maintaining strong security guarantees. Current high-performance authenticated encryption schemes achieve impressive speeds by leveraging platform-specific SIMD instructions, particularly AES-NI on x86 architectures <xref target="AES-NI"/>. Notable examples include AEGIS <xref target="I-D.irtf-cfrg-aegis-aead"/>, SNOW-V <xref target="SNOW-V"/>, and Rocca-S <xref target="ROCCA-S"/>.</t>
      <t>While these platform-specific optimizations deliver high performance on their target architectures, they create a significant performance disparity across different hardware platforms. These algorithms excel on x86 processors equipped with AES-NI but exhibit substantially degraded performance on ARM architectures that implement SIMD functionality through NEON instructions. This inconsistency poses a critical challenge for modern network deployments where ARM processors dominate mobile devices, edge computing nodes, and increasingly, data center environments.</t>
      <t>The architectural differences between x86 and ARM extend beyond instruction set variations. They encompass fundamental distinctions in how AES round functions are implemented in hardware, pipeline structures, and memory subsystems. These differences mean that algorithms optimized for one architecture may inadvertently create bottlenecks on another, resulting in unpredictable performance characteristics across heterogeneous deployments.</t>
      <t>The transition to 6G networks amplifies these challenges. Next-generation wireless systems will rely heavily on software-defined networking (SDN) and cloud radio access networks (Cloud RAN), requiring cryptographic algorithms that perform consistently across diverse hardware platforms. The stringent latency requirements and massive data rates anticipated for 6G, potentially exceeding 1 Tbps, demand encryption schemes that can leverage the full capabilities of both x86 and ARM architectures without compromise.</t>
      <t>This document presents HiAE (High-throughput Authenticated Encryption), an authenticated encryption algorithm explicitly designed to address these cross-platform performance challenges. Through careful algorithmic design, HiAE delivers high performance on both x86 and ARM architectures by efficiently utilizing the capabilities of each platform without being overly dependent on architecture-specific features.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words “<bcp14>MUST</bcp14>”, “<bcp14>MUST NOT</bcp14>”, “<bcp14>REQUIRED</bcp14>”, “<bcp14>SHALL</bcp14>”, “<bcp14>SHALL
NOT</bcp14>”, “<bcp14>SHOULD</bcp14>”, “<bcp14>SHOULD NOT</bcp14>”, “<bcp14>RECOMMENDED</bcp14>”, “<bcp14>NOT RECOMMENDED</bcp14>”,
“<bcp14>MAY</bcp14>”, and “<bcp14>OPTIONAL</bcp14>” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Throughout this document, “byte” is used interchangeably with “octet” and refers to an 8-bit sequence.</t>
      <t>Basic operations:</t>
      <ul spacing="normal">
        <li>
          <t><tt>{}</tt>: an empty bit array.</t>
        </li>
        <li>
          <t><tt>{ 0 }</tt>: a single zero byte (8 zero bits).</t>
        </li>
        <li>
          <t><tt>|x|</tt>: the length of <tt>x</tt> in bits.</t>
        </li>
        <li>
          <t><tt>a ^ b</tt>: the bitwise exclusive OR operation between <tt>a</tt> and <tt>b</tt>.</t>
        </li>
        <li>
          <t><tt>a || b</tt>: the concatenation of <tt>a</tt> and <tt>b</tt>.</t>
        </li>
        <li>
          <t><tt>a mod b</tt>: the remainder of the Euclidean division between <tt>a</tt> as the dividend and <tt>b</tt> as the divisor.</t>
        </li>
      </ul>
      <t>Data manipulation:</t>
      <ul spacing="normal">
        <li>
          <t><tt>LE64(x)</tt>: returns the little-endian encoding of unsigned 64-bit integer <tt>x</tt>.</t>
        </li>
        <li>
          <t><tt>ZeroPad(x, n)</tt>: returns <tt>x</tt> after appending zeros until its length is a multiple of <tt>n</tt> bits. No padding is added if the length of <tt>x</tt> is already a multiple of <tt>n</tt>, including when <tt>x</tt> is empty.</t>
        </li>
        <li>
          <t><tt>Truncate(x, n)</tt>: returns the first <tt>n</tt> bits of <tt>x</tt>.</t>
        </li>
        <li>
          <t><tt>Tail(x, n)</tt>: returns the last <tt>n</tt> bits of <tt>x</tt>.</t>
        </li>
        <li>
          <t><tt>Split(x, n)</tt>: returns <tt>x</tt> split into <tt>n</tt>-bit blocks, ignoring partial blocks.</t>
        </li>
      </ul>
      <t>Cryptographic operations:</t>
      <ul spacing="normal">
        <li>
          <t><tt>AESL(x)</tt>: A single AES round function without key addition. Given a 128-bit AES state <tt>x</tt>, this function applies the following AES transformations in sequence:
          </t>
          <ol spacing="normal" type="1"><li>
              <t>SubBytes: Apply the AES S-box to each byte</t>
            </li>
            <li>
              <t>ShiftRows: Cyclically shift the rows of the state</t>
            </li>
            <li>
              <t>MixColumns: Mix the columns of the state</t>
            </li>
          </ol>
          <t>
Formally: <tt>AESL(x) = MixColumns(ShiftRows(SubBytes(x)))</tt>  </t>
          <t>
These transformations are as specified in Section 5 of <xref target="FIPS-AES"/>. This is NOT the full AES encryption algorithm. It is a single round without the AddRoundKey operation (equivalent to using a zero round key). A test vector for this function is provided in the Test Vectors section.  </t>
          <t>
While Intel AES-NI and ARM NEON provide instructions with similar parameters and descriptions (such as <tt>_mm_aesenc_si128</tt> on Intel and <tt>vaesmcq_u8(vaeseq_u8(...))</tt> on ARM), these instructions are not functionally equivalent. The architectural differences in how AES round functions are implemented require platform-specific optimization strategies, as detailed in the Implementation Considerations section.</t>
        </li>
      </ul>
      <t>Control flow and comparison:</t>
      <ul spacing="normal">
        <li>
          <t><tt>Repeat(n, F)</tt>: <tt>n</tt> sequential evaluations of <tt>F</tt>.</t>
        </li>
        <li>
          <t><tt>CtEq(a, b)</tt>: compares <tt>a</tt> and <tt>b</tt> in constant-time, returning <tt>True</tt> for an exact match and <tt>False</tt> otherwise.</t>
        </li>
      </ul>
      <t>AES blocks:</t>
      <ul spacing="normal">
        <li>
          <t><tt>Si</tt>: the <tt>i</tt>-th AES block of the current state.</t>
        </li>
        <li>
          <t><tt>S'i</tt>: the <tt>i</tt>-th AES block of the next state.</t>
        </li>
        <li>
          <t><tt>{Si, ...Sj}</tt>: the vector of the <tt>i</tt>-th AES block of the current state to the <tt>j</tt>-th block of the current state.</t>
        </li>
        <li>
          <t><tt>C0</tt>: an AES block built from the following bytes in hexadecimal format: <tt>{ 0x32, 0x43, 0xf6, 0xa8, 0x88, 0x5a, 0x30, 0x8d, 0x31, 0x31, 0x98, 0xa2, 0xe0, 0x37, 0x07, 0x34 }</tt>.</t>
        </li>
        <li>
          <t><tt>C1</tt>: an AES block built from the following bytes in hexadecimal format: <tt>{ 0x4a, 0x40, 0x93, 0x82, 0x22, 0x99, 0xf3, 0x1d, 0x00, 0x82, 0xef, 0xa9, 0x8e, 0xc4, 0xe6, 0xc8 }</tt>.</t>
        </li>
        <li>
          <t><tt>ZERO</tt>: an AES block of all zeros (128 zero bits).</t>
        </li>
      </ul>
      <t>The constants C0 and C1 are domain separation constants derived from the fractional parts of π and e, respectively.</t>
      <t>Input and output values:</t>
      <ul spacing="normal">
        <li>
          <t><tt>key</tt>: the encryption key (256 bits).</t>
        </li>
        <li>
          <t><tt>nonce</tt>: the public nonce (128 bits).</t>
        </li>
        <li>
          <t><tt>ad</tt>: the associated data.</t>
        </li>
        <li>
          <t><tt>msg</tt>: the plaintext.</t>
        </li>
        <li>
          <t><tt>ct</tt>: the ciphertext.</t>
        </li>
        <li>
          <t><tt>tag</tt>: the authentication tag (128 bits).</t>
        </li>
      </ul>
    </section>
    <section anchor="the-hiae-algorithm">
      <name>The HiAE Algorithm</name>
      <t>This section provides the complete specification of HiAE. The algorithm operates on a 2048-bit internal state organized as sixteen 128-bit blocks, combining AES round functions with an efficient update mechanism to achieve both high security and cross-platform performance.</t>
      <section anchor="algorithm-parameters">
        <name>Algorithm Parameters</name>
        <t>HiAE maintains a 2048-bit state organized as sixteen 128-bit blocks denoted <tt>{S0, S1, S2, ..., S15}</tt>. Each block Si represents a 128-bit AES state that can be processed independently by AES round functions. This large state size provides security margins while enabling efficient parallel processing on modern architectures.</t>
        <t>The parameters for this algorithm, whose meaning is defined in <xref section="4" sectionFormat="comma" target="RFC5116"/>, are:</t>
        <ul spacing="normal">
          <li>
            <t><tt>K_LEN</tt> (key length) is 32 bytes (256 bits).</t>
          </li>
          <li>
            <t><tt>P_MAX</tt> (maximum length of the plaintext) is 2<sup>61</sup> - 1 bytes (2<sup>64</sup> - 8 bits).</t>
          </li>
          <li>
            <t><tt>A_MAX</tt> (maximum length of the associated data) is 2<sup>61</sup> - 1 bytes (2<sup>64</sup> - 8 bits).</t>
          </li>
          <li>
            <t><tt>N_MIN</tt> (minimum nonce length) = <tt>N_MAX</tt> (maximum nonce length) = 16 bytes (128 bits).</t>
          </li>
          <li>
            <t><tt>C_MAX</tt> (maximum ciphertext length) = <tt>P_MAX</tt> + tag length = (2<sup>61</sup> - 1) + 16 bytes ((2<sup>64</sup> - 8) + 128 bits).</t>
          </li>
        </ul>
        <t>Distinct associated data inputs, as described in <xref section="3" sectionFormat="comma" target="RFC5116"/>, <bcp14>MUST</bcp14> be unambiguously encoded as a single input.
It is up to the application to create a structure in the associated data input if needed.</t>
      </section>
      <section anchor="authenticated-encryption">
        <name>Authenticated Encryption</name>
        <artwork><![CDATA[
Encrypt(msg, ad, key, nonce)
]]></artwork>
        <t>The <tt>Encrypt</tt> function encrypts a message and returns the ciphertext along with an authentication tag that verifies the authenticity of the message and associated data, if provided.</t>
        <t>Security:</t>
        <ul spacing="normal">
          <li>
            <t>For a given key, the nonce <bcp14>MUST NOT</bcp14> be reused under any circumstances; doing so allows an attacker to recover the internal state.</t>
          </li>
          <li>
            <t>The key <bcp14>MUST</bcp14> be randomly chosen from a uniform distribution.</t>
          </li>
        </ul>
        <t>Inputs:</t>
        <ul spacing="normal">
          <li>
            <t><tt>msg</tt>: the message to be encrypted (length <bcp14>MUST</bcp14> be less than or equal to <tt>P_MAX</tt>).</t>
          </li>
          <li>
            <t><tt>ad</tt>: the associated data to authenticate (length <bcp14>MUST</bcp14> be less than or equal to <tt>A_MAX</tt>).</t>
          </li>
          <li>
            <t><tt>key</tt>: the encryption key.</t>
          </li>
          <li>
            <t><tt>nonce</tt>: the public nonce.</t>
          </li>
        </ul>
        <t>Outputs:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ct</tt>: the ciphertext.</t>
          </li>
          <li>
            <t><tt>tag</tt>: the authentication tag.</t>
          </li>
        </ul>
        <t>Steps:</t>
        <artwork><![CDATA[
Init(key, nonce)

ct = {}

ad_blocks = Split(ZeroPad(ad, 128), 128)
for ai in ad_blocks:
    Absorb(ai)

msg_blocks = Split(ZeroPad(msg, 128), 128)
for mi in msg_blocks:
    ct = ct || Enc(mi)

tag = Finalize(|ad|, |msg|)
ct = Truncate(ct, |msg|)

return (ct, tag)
]]></artwork>
      </section>
      <section anchor="authenticated-decryption">
        <name>Authenticated Decryption</name>
        <artwork><![CDATA[
Decrypt(ct, tag, ad, key, nonce)
]]></artwork>
        <t>The <tt>Decrypt</tt> function decrypts a ciphertext, verifies that the authentication tag is correct, and returns the message on success or an error if tag verification fails.</t>
        <t>Security:</t>
        <ul spacing="normal">
          <li>
            <t>If tag verification fails, the decrypted message and incorrect authentication tag <bcp14>MUST NOT</bcp14> be given as output. The decrypted message <bcp14>MUST</bcp14> be overwritten with zeros before the function returns.</t>
          </li>
          <li>
            <t>The comparison of the input <tt>tag</tt> with the <tt>expected_tag</tt> <bcp14>MUST</bcp14> be done in constant time.</t>
          </li>
        </ul>
        <t>Inputs:</t>
        <ul spacing="normal">
          <li>
            <t><tt>ct</tt>: the ciphertext to decrypt (length <bcp14>MUST</bcp14> be less than or equal to <tt>C_MAX</tt>).</t>
          </li>
          <li>
            <t><tt>tag</tt>: the authentication tag.</t>
          </li>
          <li>
            <t><tt>ad</tt>: the associated data to authenticate (length <bcp14>MUST</bcp14> be less than or equal to <tt>A_MAX</tt>).</t>
          </li>
          <li>
            <t><tt>key</tt>: the encryption key.</t>
          </li>
          <li>
            <t><tt>nonce</tt>: the public nonce.</t>
          </li>
        </ul>
        <t>Outputs:</t>
        <ul spacing="normal">
          <li>
            <t>Either the decrypted message <tt>msg</tt> or an error indicating that the authentication tag is invalid for the given inputs.</t>
          </li>
        </ul>
        <t>Steps:</t>
        <artwork><![CDATA[
Init(key, nonce)

msg = {}

ad_blocks = Split(ZeroPad(ad, 128), 128)
for ai in ad_blocks:
    Absorb(ai)

ct_blocks = Split(ct, 128)
cn = Tail(ct, |ct| mod 128)

for ci in ct_blocks:
    msg = msg || Dec(ci)

if cn is not empty:
    msg = msg || DecPartial(cn)

expected_tag = Finalize(|ad|, |msg|)

if CtEq(tag, expected_tag) is False:
    erase msg
    erase expected_tag
    return "verification failed" error
else:
    return msg
]]></artwork>
      </section>
      <section anchor="core-functions">
        <name>Core Functions</name>
        <t>The following sections describe the fundamental operations that form the building blocks of HiAE. These functions manipulate the 2048-bit state to provide confusion, diffusion, and the absorption of input data.</t>
        <section anchor="the-state-rotation-function">
          <name>The State Rotation Function</name>
          <artwork><![CDATA[
Rol()
]]></artwork>
          <t>The <tt>Rol</tt> function provides diffusion by rotating the sixteen 128-bit blocks of the state one position to the left. This ensures that local changes propagate throughout the entire state over multiple rounds.</t>
          <t>Modifies:</t>
          <ul spacing="normal">
            <li>
              <t><tt>{S0, ...S15}</tt>: the state.</t>
            </li>
          </ul>
          <t>Steps:</t>
          <artwork><![CDATA[
  t = S0
 S0 = S1
 S1 = S2
 S2 = S3
 S3 = S4
 S4 = S5
 S5 = S6
 S6 = S7
 S7 = S8
 S8 = S9
 S9 = S10
S10 = S11
S11 = S12
S12 = S13
S13 = S14
S14 = S15
S15 = t
]]></artwork>
        </section>
        <section anchor="the-state-update-functions">
          <name>The State Update Functions</name>
          <t>The state update functions form the cryptographic core of HiAE. They combine the AESL transformation with XOR operations and state rotation to achieve both security and efficiency.</t>
          <section anchor="the-update-function">
            <name>The Update Function</name>
            <artwork><![CDATA[
Update(xi)
]]></artwork>
            <t>The <tt>Update</tt> function is the core of the HiAE algorithm.
It updates the state <tt>{S0, ...S15}</tt> using a 128-bit value.</t>
            <t>Inputs:</t>
            <ul spacing="normal">
              <li>
                <t><tt>xi</tt>: the 128-bit block to be absorbed.</t>
              </li>
            </ul>
            <t>Modifies:</t>
            <ul spacing="normal">
              <li>
                <t><tt>{S0, ...S15}</tt>: the state.</t>
              </li>
            </ul>
            <t>Steps:</t>
            <artwork><![CDATA[
  t = AESL(S0 ^ S1) ^ xi
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ xi
S13 = S13 ^ xi

Rol()
]]></artwork>
          </section>
          <section anchor="the-updateenc-function">
            <name>The UpdateEnc Function</name>
            <artwork><![CDATA[
UpdateEnc(mi)
]]></artwork>
            <t>The <tt>UpdateEnc</tt> function extends the basic <tt>Update</tt> function to provide encryption. It absorbs a plaintext block while simultaneously generating the corresponding ciphertext block through an additional XOR with state block S9.</t>
            <t>Inputs:</t>
            <ul spacing="normal">
              <li>
                <t><tt>mi</tt>: a 128-bit block to be encrypted.</t>
              </li>
            </ul>
            <t>Outputs:</t>
            <ul spacing="normal">
              <li>
                <t><tt>ci</tt>: the encrypted 128-bit block.</t>
              </li>
            </ul>
            <t>Modifies:</t>
            <ul spacing="normal">
              <li>
                <t><tt>{S0, ...S15}</tt>: the state.</t>
              </li>
            </ul>
            <t>Steps:</t>
            <artwork><![CDATA[
  t = AESL(S0 ^ S1) ^ mi
 ci = t ^ S9
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ mi
S13 = S13 ^ mi

Rol()

return ci
]]></artwork>
          </section>
          <section anchor="the-updatedec-function">
            <name>The UpdateDec Function</name>
            <artwork><![CDATA[
UpdateDec(ci)
]]></artwork>
            <t>The <tt>UpdateDec</tt> function provides the inverse operation of <tt>UpdateEnc</tt>. It processes a ciphertext block to recover the plaintext while maintaining the same state update pattern, ensuring that encryption and decryption produce identical internal states.</t>
            <t>Inputs:</t>
            <ul spacing="normal">
              <li>
                <t><tt>ci</tt>: a 128-bit block to be decrypted.</t>
              </li>
            </ul>
            <t>Outputs:</t>
            <ul spacing="normal">
              <li>
                <t><tt>mi</tt>: the decrypted 128-bit block.</t>
              </li>
            </ul>
            <t>Modifies:</t>
            <ul spacing="normal">
              <li>
                <t><tt>{S0, ...S15}</tt>: the state.</t>
              </li>
            </ul>
            <t>Steps:</t>
            <artwork><![CDATA[
  t = ci ^ S9
 mi = AESL(S0 ^ S1) ^ t
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ mi
S13 = S13 ^ mi

Rol()

return mi
]]></artwork>
          </section>
          <section anchor="the-diffuse-function">
            <name>The Diffuse Function</name>
            <artwork><![CDATA[
Diffuse(x0, x1)
]]></artwork>
            <t>The <tt>Diffuse</tt> function ensures full state mixing by performing 32 consecutive update operations, alternating between two input values. This function is critical for security during initialization and finalization phases, guaranteeing that every bit of the key and nonce influences the entire state, and that the authentication tag depends on all state bits.</t>
            <t>Inputs:</t>
            <ul spacing="normal">
              <li>
                <t><tt>x0</tt>: a 128-bit input value for even-numbered updates (updates 0, 2, 4, ..., 30).</t>
              </li>
              <li>
                <t><tt>x1</tt>: a 128-bit input value for odd-numbered updates (updates 1, 3, 5, ..., 31).</t>
              </li>
            </ul>
            <t>Modifies:</t>
            <ul spacing="normal">
              <li>
                <t><tt>{S0, ...S15}</tt>: the state.</t>
              </li>
            </ul>
            <t>Steps:</t>
            <artwork><![CDATA[
Repeat(16,
  Update(x0)
  Update(x1)
)
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="initialization-and-processing-functions">
        <name>Initialization and Processing Functions</name>
        <t>The following functions implement the high-level operations of HiAE: initialization, data absorption, encryption/decryption, and finalization.</t>
        <section anchor="the-init-function">
          <name>The Init Function</name>
          <artwork><![CDATA[
Init(key, nonce)
]]></artwork>
          <t>The <tt>Init</tt> function constructs the initial state <tt>{S0, ...S15}</tt> from the encryption key and nonce. The initialization process carefully distributes key material across the state and applies the Diffuse function to ensure all state bits are cryptographically mixed before processing begins.</t>
          <t>Inputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>key</tt>: the encryption key.</t>
            </li>
            <li>
              <t><tt>nonce</tt>: the public nonce.</t>
            </li>
          </ul>
          <t>Defines:</t>
          <ul spacing="normal">
            <li>
              <t><tt>{S0, ...S15}</tt>: the initial state.</t>
            </li>
          </ul>
          <t>Steps:</t>
          <artwork><![CDATA[
k0, k1 = Split(key, 128)

 S0 = C0
 S1 = k0
 S2 = C0
 S3 = nonce
 S4 = ZERO
 S5 = k0
 S6 = ZERO
 S7 = C1
 S8 = k1
 S9 = ZERO
S10 = nonce ^ k1
S11 = C0
S12 = C1
S13 = k1
S14 = ZERO
S15 = C0 ^ C1

Diffuse(k0, k1)
]]></artwork>
        </section>
        <section anchor="the-absorb-function">
          <name>The Absorb Function</name>
          <artwork><![CDATA[
Absorb(ai)
]]></artwork>
          <t>The <tt>Absorb</tt> function processes associated data by incorporating 128-bit blocks into the internal state. This function is used exclusively for authenticated data that should influence the authentication tag but not produce ciphertext output.</t>
          <t>Inputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>ai</tt>: the 128-bit input block.</t>
            </li>
          </ul>
          <t>Steps:</t>
          <artwork><![CDATA[
Update(ai)
]]></artwork>
        </section>
        <section anchor="the-enc-function">
          <name>The Enc Function</name>
          <artwork><![CDATA[
Enc(mi)
]]></artwork>
          <t>The <tt>Enc</tt> function encrypts a single 128-bit plaintext block. It serves as a simple wrapper around <tt>UpdateEnc</tt>, providing a clean interface for the block-by-block encryption process.</t>
          <t>Inputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>mi</tt>: the 128-bit input block.</t>
            </li>
          </ul>
          <t>Outputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>ci</tt>: the 128-bit encrypted block.</t>
            </li>
          </ul>
          <t>Steps:</t>
          <artwork><![CDATA[
ci = UpdateEnc(mi)
return ci
]]></artwork>
        </section>
        <section anchor="the-dec-function">
          <name>The Dec Function</name>
          <artwork><![CDATA[
Dec(ci)
]]></artwork>
          <t>The <tt>Dec</tt> function decrypts a single 128-bit ciphertext block. Like <tt>Enc</tt>, it provides a clean interface by wrapping the <tt>UpdateDec</tt> function.</t>
          <t>Inputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>ci</tt>: the 128-bit encrypted block.</t>
            </li>
          </ul>
          <t>Outputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>mi</tt>: the 128-bit decrypted block.</t>
            </li>
          </ul>
          <t>Steps:</t>
          <artwork><![CDATA[
mi = UpdateDec(ci)
return mi
]]></artwork>
        </section>
        <section anchor="the-decpartial-function">
          <name>The DecPartial Function</name>
          <artwork><![CDATA[
DecPartial(cn)
]]></artwork>
          <t>The <tt>DecPartial</tt> function handles the special case of decrypting a partial block at the end of a ciphertext. This function carefully reconstructs the keystream to decrypt blocks smaller than 128 bits while maintaining the same state evolution as encryption.</t>
          <t>Inputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>cn</tt>: the encrypted input.</t>
            </li>
          </ul>
          <t>Outputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>mn</tt>: the decryption of <tt>cn</tt>.</t>
            </li>
          </ul>
          <t>Steps:</t>
          <artwork><![CDATA[
# Step 1: Recover the keystream that would encrypt a full zero block
ks = AESL(S0 ^ S1) ^ ZeroPad(cn, 128) ^ S9

# Step 2: Construct a full 128-bit ciphertext block
# by appending the appropriate keystream bits
ci = cn || Tail(ks, 128 - |cn|)

# Step 3: Decrypt the full block using standard UpdateDec
mi = UpdateDec(ci)

# Step 4: Extract only the decrypted bytes corresponding to the partial input
mn = Truncate(mi, |cn|)

return mn
]]></artwork>
        </section>
        <section anchor="the-finalize-function">
          <name>The Finalize Function</name>
          <artwork><![CDATA[
Finalize(ad_len_bits, msg_len_bits)
]]></artwork>
          <t>The <tt>Finalize</tt> function completes the authentication process by generating a 128-bit tag. It incorporates the lengths of both the associated data and message (each encoded as 8 bytes in little-endian format), applies the Diffuse function for final mixing, and combines all state blocks to produce the authentication tag.</t>
          <t>Inputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>ad_len_bits</tt>: the length of the associated data in bits.</t>
            </li>
            <li>
              <t><tt>msg_len_bits</tt>: the length of the message in bits.</t>
            </li>
          </ul>
          <t>Outputs:</t>
          <ul spacing="normal">
            <li>
              <t><tt>tag</tt>: the authentication tag.</t>
            </li>
          </ul>
          <t>Steps:</t>
          <artwork><![CDATA[
t = LE64(ad_len_bits) || LE64(msg_len_bits)
Diffuse(t, t)

tag = S0 ^ S1 ^ S2 ^ S3 ^ S4 ^ S5 ^ S6 ^ S7 ^
      S8 ^ S9 ^ S10 ^ S11 ^ S12 ^ S13 ^ S14 ^ S15

return tag
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="encoding-ct-tag-tuples">
      <name>Encoding (ct, tag) Tuples</name>
      <t>Applications <bcp14>MAY</bcp14> keep the ciphertext and the authentication tag in distinct structures or encode both as a single string.</t>
      <t>In the latter case, the tag <bcp14>MUST</bcp14> immediately follow the ciphertext:</t>
      <artwork><![CDATA[
combined_ct = ct || tag
]]></artwork>
    </section>
    <section anchor="alternative-operating-modes">
      <name>Alternative Operating Modes</name>
      <t>While HiAE is primarily designed as an authenticated encryption algorithm, its flexible structure allows it to operate in two additional modes: as a stream cipher for keystream generation and as a message authentication code (MAC) for data authentication without encryption.</t>
      <section anchor="hiae-as-a-stream-cipher">
        <name>HiAE as a Stream Cipher</name>
        <t>The stream cipher mode of HiAE generates a keystream by encrypting an all-zero message.</t>
        <artwork><![CDATA[
Stream(len, key, nonce)
]]></artwork>
        <t>The <tt>Stream</tt> function expands a key and an optional nonce into a variable-length keystream.</t>
        <t>Security:</t>
        <ul spacing="normal">
          <li>
            <t>When the nonce is fixed (including when using the default all-zeros nonce), a unique key <bcp14>MUST</bcp14> be used for each invocation to maintain security.</t>
          </li>
        </ul>
        <t>Inputs:</t>
        <ul spacing="normal">
          <li>
            <t><tt>len</tt>: the length of the keystream to generate in bits.</t>
          </li>
          <li>
            <t><tt>key</tt>: the HiAE key.</t>
          </li>
          <li>
            <t><tt>nonce</tt>: the HiAE nonce. If unspecified, it is set to <tt>N_MAX</tt> zero bytes.</t>
          </li>
        </ul>
        <t>Outputs:</t>
        <ul spacing="normal">
          <li>
            <t><tt>stream</tt>: the keystream.</t>
          </li>
        </ul>
        <t>Steps:</t>
        <artwork><![CDATA[
if len == 0:
    return {}
else:
    stream, tag = Encrypt(ZeroPad({ 0 }, len), {}, key, nonce)
    return stream
]]></artwork>
        <t>This is equivalent to encrypting a message of <tt>len</tt> zero bits without associated data and discarding the authentication tag.</t>
        <t>Instead of relying on the generic <tt>Encrypt</tt> function, implementations can omit the <tt>Finalize</tt> function.</t>
        <t>After initialization, the <tt>Update</tt> function is called with constant parameters, allowing further optimizations.</t>
      </section>
      <section anchor="hiae-as-a-message-authentication-code">
        <name>HiAE as a Message Authentication Code</name>
        <t>In MAC mode, HiAE processes input data without generating ciphertext, producing only an authentication tag. This mode is useful when data authenticity is required without confidentiality.</t>
        <t>Note: Implementations of the <tt>Encrypt</tt> and <tt>Decrypt</tt> functions are not required to support MAC-only mode. This is an optional feature that can be implemented separately.</t>
        <artwork><![CDATA[
Mac(data, key, nonce)
]]></artwork>
        <t>Security:</t>
        <ul spacing="normal">
          <li>
            <t>This is the only function that allows the reuse of <tt>(key, nonce)</tt> pairs with different inputs.</t>
          </li>
          <li>
            <t>HiAE-based MAC functions <bcp14>MUST NOT</bcp14> be used as hash functions: if the key is known, inputs causing state collisions can easily be crafted.</t>
          </li>
          <li>
            <t>Unlike hash-based MACs, tags <bcp14>MUST NOT</bcp14> be used for key derivation as there is no guarantee that they are uniformly random.</t>
          </li>
        </ul>
        <t>Inputs:</t>
        <ul spacing="normal">
          <li>
            <t><tt>data</tt>: the input data to authenticate (length <bcp14>MUST</bcp14> be less than or equal to <tt>A_MAX</tt>).</t>
          </li>
          <li>
            <t><tt>key</tt>: the secret key.</t>
          </li>
          <li>
            <t><tt>nonce</tt>: the public nonce.</t>
          </li>
        </ul>
        <t>Outputs:</t>
        <ul spacing="normal">
          <li>
            <t><tt>tag</tt>: the authentication tag.</t>
          </li>
        </ul>
        <t>Steps:</t>
        <artwork><![CDATA[
Init(key, nonce)

data_blocks = Split(ZeroPad(data, 128), 128)
for di in data_blocks:
    Absorb(di)

tag = Finalize(|data|, 0)

return tag
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="classic-setting">
        <name>Classic Setting</name>
        <t>HiAE provides 256-bit security against key recovery and state recovery attacks, along with 128-bit security for integrity against forgery attempts.</t>
        <t>Usage constraints:</t>
        <ul spacing="normal">
          <li>
            <t>Tag truncation is not allowed. Implementations <bcp14>MUST</bcp14> use the full 128-bit authentication tag.</t>
          </li>
          <li>
            <t>A single key <bcp14>MUST NOT</bcp14> be used to protect more than 2<sup>64</sup> messages.</t>
          </li>
          <li>
            <t>For a given key, the nonce <bcp14>MUST NOT</bcp14> be reused under any circumstances (as specified in the Authenticated Encryption section).</t>
          </li>
        </ul>
        <t>It is important to note that the encryption security assumes the attacker cannot successfully forge messages through repeated trials <xref target="HiAE-Clarification"/>.</t>
        <t>Regarding keystream bias attacks, analysis shows that at least 150-bit security is guaranteed by HiAE.</t>
        <t>Finally, HiAE is assumed to be secure against key-committing attacks at the birthday bound security level (64 bits), but it is not secure in the context-committing setting.</t>
      </section>
      <section anchor="quantum-setting">
        <name>Quantum Setting</name>
        <t>HiAE targets a security strength of 128 bits against key recovery attacks and forgery attacks in the quantum setting. Security is not claimed against online superposition queries to cryptographic oracles, as such attacks are highly impractical in real-world applications.</t>
      </section>
      <section anchor="attack-considerations">
        <name>Attack Considerations</name>
        <t>HiAE is assumed to be secure against the following attacks:</t>
        <ol spacing="normal" type="1"><li>
            <t>Key-Recovery Attack: 256-bit security against key recovery attacks.</t>
          </li>
          <li>
            <t>Differential Attack: 256-bit security against differential attacks in the initialization phase.</t>
          </li>
          <li>
            <t>Forgery Attack: 128-bit security against forgery attacks.</t>
          </li>
          <li>
            <t>Integral Attack: Secure against integral attacks.</t>
          </li>
          <li>
            <t>State-Recovery Attack:
            </t>
            <ul spacing="normal">
              <li>
                <t>Guess-and-Determine Attack: The time complexity of the guess-and-determine attack cannot be lower than 2<sup>256</sup>.</t>
              </li>
              <li>
                <t>Algebraic Attack: The system of equations to recover HiAE states cannot be solved with time complexity lower than 2<sup>256</sup>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Linear Bias: At least 150-bit security against statistical attacks.</t>
          </li>
          <li>
            <t>Key-Committing Attacks: Secure in the FROB, CMT-1, and CMT-2 models at the birthday bound security level.</t>
          </li>
          <li>
            <t>Context-Committing Attacks: Security is not claimed in the CMT-3 model.</t>
          </li>
        </ol>
        <t>The details of the cryptanalysis can be found in the paper <xref target="HiAE"/>.</t>
      </section>
    </section>
    <section anchor="implementation-considerations">
      <name>Implementation Considerations</name>
      <t>HiAE is designed to balance the performance of XOR and AES instructions across both ARM and x86 architectures while being optimized to push performance to its limits. The algorithm’s XAXX structure enables platform-specific optimizations by exploiting the fundamental differences in how ARM and Intel processors implement AES round functions.</t>
      <section anchor="state-rotation-optimization">
        <name>State Rotation Optimization</name>
        <t>Instead of performing physical rotations with the <tt>Rol()</tt> function, implementations can use a cycling index (offset) approach to avoid copying the entire 2048-bit state on every rotation. This optimization provides significant performance improvements across all platforms.</t>
        <section anchor="cycling-index-approach">
          <name>Cycling Index Approach</name>
          <t>The standard <tt>Rol()</tt> function requires copying all sixteen 128-bit blocks:</t>
          <artwork><![CDATA[
  t = S0
 S0 = S1
 S1 = S2
 ...
S15 = t
]]></artwork>
          <t>This approach copies 2048 bits of data on every rotation. An optimized implementation can instead:</t>
          <ol spacing="normal" type="1"><li>
              <t>Keep the state blocks in a fixed array position</t>
            </li>
            <li>
              <t>Maintain an <tt>offset</tt> variable tracking the logical position of S0</t>
            </li>
            <li>
              <t>Map logical state block Si to physical position <tt>(i + offset) mod 16</tt></t>
            </li>
            <li>
              <t>Replace the entire <tt>Rol()</tt> operation with: <tt>offset = (offset + 1) mod 16</tt></t>
            </li>
          </ol>
        </section>
        <section anchor="state-access-pattern">
          <name>State Access Pattern</name>
          <t>With this optimization, the logical-to-physical state block mapping becomes:</t>
          <ul spacing="normal">
            <li>
              <t>Logical <tt>S0</tt> maps to physical position <tt>offset mod 16</tt></t>
            </li>
            <li>
              <t>Logical <tt>S3</tt> maps to physical position <tt>(3 + offset) mod 16</tt></t>
            </li>
            <li>
              <t>Logical <tt>S9</tt> maps to physical position <tt>(9 + offset) mod 16</tt></t>
            </li>
            <li>
              <t>Logical <tt>S13</tt> maps to physical position <tt>(13 + offset) mod 16</tt></t>
            </li>
          </ul>
          <t>This approach is mathematically equivalent to the specification but eliminates the expensive memory operations associated with state rotation. Since <tt>Rol()</tt> is called in every <tt>Update()</tt>, <tt>UpdateEnc()</tt>, and <tt>UpdateDec()</tt> operation, this optimization provides substantial performance benefits during encryption and decryption operations.</t>
        </section>
        <section anchor="batch-processing-optimization">
          <name>Batch Processing Optimization</name>
          <t>Since the offset cycles back to zero every 16 operations (<tt>offset mod 16</tt>), implementations may benefit from processing data in batches of 16 blocks. After processing 16 consecutive input blocks, the logical state mapping returns to its original configuration, which can simplify implementation and potentially enable further optimizations such as loop unrolling or vectorization of the batch processing logic.</t>
          <t>When the offset is aligned to zero at the start of a batch, implementations can hardcode the specific offset values for each operation within the unrolled batch processing function, eliminating the need for modular arithmetic during the inner loop and providing additional performance benefits.</t>
        </section>
      </section>
      <section anchor="platform-specific-optimizations">
        <name>Platform-Specific Optimizations</name>
        <t>The key to HiAE’s cross-platform efficiency lies in understanding how different architectures implement AES operations.</t>
        <t>The following optimizations leverage architectural differences between ARM and Intel processors to maximize HiAE’s performance while maintaining cryptographic correctness.</t>
        <section anchor="arm-neon-optimizations">
          <name>ARM NEON Optimizations</name>
          <t>ARM processors with NEON SIMD extensions can efficiently compute <tt>AESL(x^y)</tt> and (with SHA3 extensions) three-way XOR operations. For convenience, the following additional primitives can be defined:</t>
          <ul spacing="normal">
            <li>
              <t><tt>XAESL(x, y)</tt>: Computes <tt>AESL(x^y)</tt> in a single fused operation (assembly instruction <tt>AESE ∘ AESMC</tt>, or equivalently C intrinsic <tt>vaesmcq_u8(vaeseq_u8(x, y))</tt>)</t>
            </li>
            <li>
              <t><tt>XOR3(x, y, z)</tt>: Computes <tt>x^y^z</tt> in a single three-way XOR instruction (assembly instruction <tt>EOR3</tt>, or equivalently C intrinsic <tt>veor3q_u8(x, y, z)</tt>)</t>
            </li>
          </ul>
          <section anchor="arm-optimized-update-function">
            <name>ARM-Optimized Update Function</name>
            <t>Original implementation:</t>
            <artwork><![CDATA[
Update(xi)
  t = AESL(S0 ^ S1) ^ xi
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ xi
S13 = S13 ^ xi
Rol()
]]></artwork>
            <t>ARM-optimized implementation:</t>
            <artwork><![CDATA[
Update_ARM(xi)
  t = XAESL(S0, S1) ^ xi
 S0 = AESL(S13) ^ t
 S3 = S3 ^ xi
S13 = S13 ^ xi
Rol()
]]></artwork>
          </section>
          <section anchor="arm-optimized-updateenc-function">
            <name>ARM-Optimized UpdateEnc Function</name>
            <t>Original implementation:</t>
            <artwork><![CDATA[
UpdateEnc(mi)
  t = AESL(S0 ^ S1) ^ mi
 ci = t ^ S9
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ mi
S13 = S13 ^ mi
Rol()
return ci
]]></artwork>
            <t>ARM-optimized implementation:</t>
            <artwork><![CDATA[
UpdateEnc_ARM(mi)
  t = XAESL(S0, S1) ^ mi
 ci = t ^ S9
 S0 = AESL(S13) ^ t
 S3 = S3 ^ mi
S13 = S13 ^ mi
Rol()
return ci
]]></artwork>
          </section>
          <section anchor="arm-optimized-updatedec-function">
            <name>ARM-Optimized UpdateDec Function</name>
            <t>Original implementation:</t>
            <artwork><![CDATA[
UpdateDec(ci)
  t = ci ^ S9
 mi = AESL(S0 ^ S1) ^ t
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ mi
S13 = S13 ^ mi
Rol()
return mi
]]></artwork>
            <t>ARM-optimized implementation:</t>
            <artwork><![CDATA[
UpdateDec_ARM(ci)
  t = ci ^ S9
 mi = XAESL(S0, S1) ^ t
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ mi
S13 = S13 ^ mi
Rol()
return mi
]]></artwork>
          </section>
          <section anchor="arm-optimized-decpartial-function">
            <name>ARM-Optimized DecPartial Function</name>
            <t>Original implementation:</t>
            <artwork><![CDATA[
DecPartial(cn)
ks = AESL(S0 ^ S1) ^ ZeroPad(cn, 128) ^ S9
ci = cn || Tail(ks, 128 - |cn|)
mi = UpdateDec(ci)
mn = Truncate(mi, |cn|)
return mn
]]></artwork>
            <t>ARM-optimized implementation:</t>
            <artwork><![CDATA[
DecPartial_ARM(cn)
ks = XOR3(XAESL(S0, S1), ZeroPad(cn, 128), S9)
ci = cn || Tail(ks, 128 - |cn|)
mi = UpdateDec_ARM(ci)
mn = Truncate(mi, |cn|)
return mn
]]></artwork>
          </section>
        </section>
        <section anchor="intel-aes-ni-optimizations">
          <name>Intel AES-NI Optimizations</name>
          <t>Intel processors with AES-NI can efficiently compute <tt>AESL(y)^z</tt> patterns. We can define the following additional function:</t>
          <ul spacing="normal">
            <li>
              <t><tt>AESLX(y, z)</tt>: Computes <tt>AESL(y) ^ z</tt> using a single instruction (assembly instruction <tt>AESENC</tt>, or equivalently C intrinsic <tt>_mm_aesenc_si128(y, z)</tt>)</t>
            </li>
          </ul>
          <section anchor="intel-optimized-update-function">
            <name>Intel-Optimized Update Function</name>
            <t>Original implementation:</t>
            <artwork><![CDATA[
Update(xi)
  t = AESL(S0 ^ S1) ^ xi
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ xi
S13 = S13 ^ xi
Rol()
]]></artwork>
            <t>Intel-optimized implementation:</t>
            <artwork><![CDATA[
Update_Intel(xi)
  t = AESLX(S0 ^ S1, xi)
 S0 = AESLX(S13, t)
 S3 =  S3 ^ xi
S13 = S13 ^ xi
Rol()
]]></artwork>
          </section>
          <section anchor="intel-optimized-updateenc-function">
            <name>Intel-Optimized UpdateEnc Function</name>
            <t>Original implementation:</t>
            <artwork><![CDATA[
UpdateEnc(mi)
  t = AESL(S0 ^ S1) ^ mi
 ci = t ^ S9
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ mi
S13 = S13 ^ mi
Rol()
return ci
]]></artwork>
            <t>Intel-optimized implementation:</t>
            <artwork><![CDATA[
UpdateEnc_Intel(mi)
 ci = AESLX(S0 ^ S1, mi ^ S9)
  t = ci ^ S9
 S0 = AESLX(S13, t)
 S3 =  S3 ^ mi
S13 = S13 ^ mi
Rol()
return ci
]]></artwork>
          </section>
          <section anchor="intel-optimized-updatedec-function">
            <name>Intel-Optimized UpdateDec Function</name>
            <t>Original implementation:</t>
            <artwork><![CDATA[
UpdateDec(ci)
  t = ci ^ S9
 mi = AESL(S0 ^ S1) ^ t
 S0 = AESL(S13) ^ t
 S3 =  S3 ^ mi
S13 = S13 ^ mi
Rol()
return mi
]]></artwork>
            <t>Intel-optimized implementation:</t>
            <artwork><![CDATA[
UpdateDec_Intel(ci)
  t = ci ^ S9
 mi = AESLX(S0 ^ S1, t)
 S0 = AESLX(S13, t)
 S3 =  S3 ^ mi
S13 = S13 ^ mi
Rol()
return mi
]]></artwork>
          </section>
          <section anchor="intel-optimized-decpartial-function">
            <name>Intel-Optimized DecPartial Function</name>
            <t>Original implementation:</t>
            <artwork><![CDATA[
DecPartial(cn)
ks = AESL(S0 ^ S1) ^ ZeroPad(cn, 128) ^ S9
ci = cn || Tail(ks, 128 - |cn|)
mi = UpdateDec(ci)
mn = Truncate(mi, |cn|)
return mn
]]></artwork>
            <t>Intel-optimized implementation:</t>
            <artwork><![CDATA[
DecPartial_Intel(cn)
ks = AESLX(S0 ^ S1, ZeroPad(cn, 128) ^ S9)
ci = cn || Tail(ks, 128 - |cn|)
mi = UpdateDec_Intel(ci)
mn = Truncate(mi, |cn|)
return mn
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="decryption-performance">
        <name>Decryption Performance</name>
        <t>It is expected that HiAE decryption will be slower than encryption due to inherent data dependencies in the algorithm. While encryption can process keystream generation and state updates in parallel, decryption must first recover the plaintext before performing any state updates. This sequential dependency chain is a consequence of HiAE’s design, which incorporates plaintext into the internal state to provide strong authentication properties.</t>
      </section>
      <section anchor="security-considerations-for-implementations">
        <name>Security Considerations for Implementations</name>
        <t>The security of HiAE against timing and physical attacks is limited by the implementation of the underlying <tt>AESL</tt> function. Failure to implement <tt>AESL</tt> in a fashion safe against timing and physical attacks, such as differential power analysis, timing analysis, or fault injection attacks, may lead to leakage of secret key material or state information. The exact mitigations required for timing and physical attacks depend on the threat model in question.</t>
        <t>When implementing the platform-specific optimizations described above, care must be taken to ensure that:</t>
        <ul spacing="normal">
          <li>
            <t>All operations complete in constant time</t>
          </li>
          <li>
            <t>No secret-dependent memory accesses occur</t>
          </li>
          <li>
            <t>The optimization does not introduce timing variations based on input data</t>
          </li>
        </ul>
      </section>
      <section anchor="validation">
        <name>Validation</name>
        <t>A complete list of known implementations and integrations is available at https://github.com/hiae-aead/draft-pham-hiae, including reference implementations. A comprehensive comparison of HiAE’s performance with other high-throughput authenticated encryption schemes on ARM and x86 architectures is also provided, demonstrating the effectiveness of these platform-specific optimizations.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following entry in the AEAD Algorithms Registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Algorithm Name</th>
            <th align="left">ID</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <tt>AEAD_HIAE</tt></td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="FIPS-AES" target="https://doi.org/10.6028/NIST.FIPS.197-upd1">
          <front>
            <title>Advanced Encryption Standard (AES)</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2023" month="May"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/NIST.FIPS.197-upd1"/>
          <refcontent>Federal Information Processing Standards Publication 197, Update 1</refcontent>
        </reference>
        <reference anchor="I-D.irtf-cfrg-aegis-aead">
          <front>
            <title>The AEGIS Family of Authenticated Encryption Algorithms</title>
            <author fullname="Frank Denis" initials="F." surname="Denis">
              <organization>Fastly Inc.</organization>
            </author>
            <author fullname="Samuel Lucas" initials="S." surname="Lucas">
              <organization>Individual Contributor</organization>
            </author>
            <date day="5" month="October" year="2025"/>
            <abstract>
              <t>   This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and
   AEGIS-256X AES-based authenticated encryption algorithms designed for
   high-performance applications.

   The document is a product of the Crypto Forum Research Group (CFRG).
   It is not an IETF product and is not a standard.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/cfrg/draft-irtf-cfrg-aegis-aead.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aegis-aead-18"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5116">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ROCCA-S">
          <front>
            <title>An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation</title>
            <author initials="R." surname="Anand" fullname="Ravi Anand">
              <organization/>
            </author>
            <author initials="S." surname="Banik" fullname="Subhadeep Banik">
              <organization/>
            </author>
            <author initials="A." surname="Caforio" fullname="Andrea Caforio">
              <organization/>
            </author>
            <author initials="K." surname="Fukushima" fullname="Kazuhide Fukushima">
              <organization/>
            </author>
            <author initials="T." surname="Isobe" fullname="Takanori Isobe">
              <organization/>
            </author>
            <author initials="S." surname="Kiyomoto" fullname="Shisaku Kiyomoto">
              <organization/>
            </author>
            <author initials="F." surname="Liu" fullname="Fukang Liu">
              <organization/>
            </author>
            <author initials="Y." surname="Nakano" fullname="Yuto Nakano">
              <organization/>
            </author>
            <author initials="K." surname="Sakamoto" fullname="Kosei Sakamoto">
              <organization/>
            </author>
            <author initials="N." surname="Takeuchi" fullname="Nobuyuki Takeuchi">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-3-031-50594-2_12"/>
          <refcontent>Computer Security – ESORICS 2023</refcontent>
        </reference>
        <reference anchor="SNOW-V">
          <front>
            <title>A new SNOW stream cipher called SNOW-V</title>
            <author initials="P." surname="Ekdahl" fullname="Patrik Ekdahl">
              <organization>Ericsson Research</organization>
            </author>
            <author initials="T." surname="Johansson" fullname="Thomas Johansson">
              <organization>Lund University</organization>
            </author>
            <author initials="A." surname="Maximov" fullname="Alexander Maximov">
              <organization>Ericsson Research</organization>
            </author>
            <author initials="J." surname="Yang" fullname="Jing Yang">
              <organization>Ericsson Research</organization>
            </author>
            <date year="2019"/>
          </front>
          <seriesInfo name="DOI" value="10.13154/tosc.v2019.i3.1-42"/>
          <refcontent>IACR Transactions on Symmetric Cryptology, 2019(3)</refcontent>
        </reference>
        <reference anchor="AES-NI" target="https://www.intel.com/content/dam/doc/white-paper/advanced-encryption-standard-new-instructions-set-paper.pdf">
          <front>
            <title>Intel Advanced Encryption Standard (AES) New Instructions Set</title>
            <author initials="S." surname="Gueron" fullname="Shay Gueron">
              <organization>Intel Corporation</organization>
            </author>
            <date year="2010"/>
          </front>
        </reference>
        <reference anchor="HiAE" target="https://eprint.iacr.org/2025/377">
          <front>
            <title>HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency</title>
            <author initials="H." surname="Chen" fullname="Han Chen">
              <organization>Huawei International Pte., Ltd.</organization>
            </author>
            <author initials="T." surname="Huang" fullname="Tao Huang">
              <organization>Huawei International Pte., Ltd.</organization>
            </author>
            <author initials="P." surname="Pham" fullname="Phuong Pham">
              <organization>Huawei International Pte., Ltd.</organization>
            </author>
            <author initials="S." surname="Wu" fullname="Shuang Wu">
              <organization>Huawei International Pte., Ltd.</organization>
            </author>
            <date year="2025"/>
          </front>
          <refcontent>Cryptology ePrint Archive, Paper 2025/377</refcontent>
        </reference>
        <reference anchor="HiAE-Clarification" target="https://eprint.iacr.org/2025/1235">
          <front>
            <title>HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks</title>
            <author initials="H." surname="Chen" fullname="Han Chen">
              <organization>Huawei International Pte., Ltd.</organization>
            </author>
            <author initials="T." surname="Huang" fullname="Tao Huang">
              <organization>Huawei International Pte., Ltd.</organization>
            </author>
            <author initials="P." surname="Pham" fullname="Phuong Pham">
              <organization>Huawei International Pte., Ltd.</organization>
            </author>
            <author initials="S." surname="Wu" fullname="Shuang Wu">
              <organization>Huawei International Pte., Ltd.</organization>
            </author>
            <date year="2025"/>
          </front>
          <refcontent>Cryptology ePrint Archive, Paper 2025/1235</refcontent>
        </reference>
      </references>
    </references>
    <?line 1153?>

<section anchor="test-vectors">
      <name>Test Vectors</name>
      <section anchor="test-vector-1-empty-plaintext-no-ad">
        <name>Test Vector 1 - Empty plaintext, no AD</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 4b7a9c3ef8d2165a0b3e5f8c9d4a7b1e
        2c5f8a9d3b6e4c7f0a1d2e5b8c9f4a7d

nonce : a5b8c2d9e3f4a7b1c8d5e9f2a3b6c7d8

ad    :

msg   :

ct    :

tag   : a25049aa37deea054de461d10ce7840b
]]></sourcecode>
      </section>
      <section anchor="test-vector-2-single-block-plaintext-no-ad">
        <name>Test Vector 2 - Single block plaintext, no AD</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 2f8e4d7c3b9a5e1f8d2c6b4a9f3e7d5c
        1b8a6f4e3d2c9b5a8f7e6d4c3b2a1f9e

nonce : 7c3e9f5a1d8b4c6f2e9a5d7b3f8c1e4a

ad    :

msg   : 55f00fcc339669aa55f00fcc339669aa

ct    : af9bd1865daa6fc351652589abf70bff

tag   : ed9e2edc8241c3184fc08972bd8e9952
]]></sourcecode>
      </section>
      <section anchor="test-vector-3-empty-plaintext-with-ad">
        <name>Test Vector 3 - Empty plaintext with AD</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 9f3e7d5c4b8a2f1e9d8c7b6a5f4e3d2c
        1b0a9f8e7d6c5b4a3f2e1d0c9b8a7f6e

nonce : 3d8c7f2a5b9e4c1f8a6d3b7e5c2f9a4d

ad    : 394a5b6c7d8e9fb0c1d2e3f405162738
        495a6b7c8d9eafc0d1e2f30415263748

msg   :

ct    :

tag   : 7e19c04f68f5af633bf67529cfb5e5f4
]]></sourcecode>
      </section>
      <section anchor="test-vector-4-rate-aligned-plaintext-256-bytes">
        <name>Test Vector 4 - Rate-aligned plaintext (256 bytes)</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 6c8f2d5a9e3b7f4c1d8a5e9f3c7b2d6a
        4f8e1c9b5d3a7e2f4c8b6d9a1e5f3c7d

nonce : 9a5c7e3f1b8d4a6c2e9f5b7d3a8c1e6f

ad    :

msg   : ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff
        ffffffffffffffffffffffffffffffff

ct    : cf9f118ccc3ae98998ddaae1a5d1f9a1
        69e4ca3e732baf7178cdd9a353057166
        8fe403e77111eac3da34bf2f25719cea
        09445cc58197b1c6ac490626724e7372
        707cfb60cdba8262f0e33a1ef8adda1f
        2e390a80c58e5c055d9be9bbccdc06ad
        af74f1dcaa372204bf42e5e0e0ac5943
        7a353978298837023f79fac6daa1fe8f
        6bcaaaf060ae2e37ed7b7da0577a7643
        5f0403b8e277b6bc2ea99682f2d0d577
        77fec6d901e0d8fc7cf46bb97336812a
        2d8cfd39053993288cce2c077fce0c6c
        00e99cf919281b261acf86b058164f10
        1d9c24e8f40b4fa0ed60955eeeb4e33f
        f1087519c13db8e287199a7df7e94b0d
        368da9ccf3d2ecebfa46f860348f8e3c

tag   : 4f42c3042cba3973153673156309dd69
]]></sourcecode>
      </section>
      <section anchor="test-vector-5-rate-1-byte-plaintext">
        <name>Test Vector 5 - Rate + 1 byte plaintext</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 3e9d6c5b4a8f7e2d1c9b8a7f6e5d4c3b
        2a1f0e9d8c7b6a5f4e3d2c1b0a9f8e7d

nonce : 6f2e8a5c9b3d7f1e4a8c5b9d3f7e2a6c

ad    : 6778899aabbccddeef00112233445566

msg   : cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc339669aa55f00fcc339669aa55f00f
        cc

ct    : 522e4cd9b0881809d80e149bb4ed8b8a
        dd70b7257afca6c2bc38e4da11e290cf
        cabd9dd1d4ed8c514482f444f903e42e
        c21a7a605ee37f95a504ec667fabec40
        66eb4521cdaf9c4eb7b62d659ab0a936
        3b145f1120c1b2e589ab9cb893d01be0
        d22182fc7de4932f1e8652b50e4a0d48
        c49a8a1232b201e2e535cd95c15cf0ee
        389b75e372653579c72c4dd1906fd81c
        2b9fc2483fab8b4df5a09d59753b5bd4
        1334be2e5085e349b6e5aac0c555a0a8
        3e94eab974052131f8d451c9d85389a3
        6126f93464e6f93119c6b1bf15b4c0a9
        e6c9beb52e82c846c472f87c15ac49e9
        9d59248ba7e6b97ca04327769d6b8c1f
        751d95dba709fb335183c21476836ea1
        ab

tag   : 61bac11505dd8bbf55e7fbb7489de7b0
]]></sourcecode>
      </section>
      <section anchor="test-vector-6-rate-1-byte-plaintext">
        <name>Test Vector 6 - Rate - 1 byte plaintext</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 8a7f6e5d4c3b2a1f0e9d8c7b6a5f4e3d
        2c1b0a9f8e7d6c5b4a3f2e1d0c9b8a7f

nonce : 4d8b2f6a9c3e7f5d1b8a4c6e9f3d5b7a

ad    :

msg   : 00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        000000000000000000000000000000

ct    : 2ba49be54eb675efe446fd597721d4cd
        ca6e01f1a51728a859d8f206d13cdb08
        ba4f0fe78fbbd6885964ed54e9beceed
        1ff306642c4761e67efa7a2620e57128
        15b5e9f066b42e879cd62e7adc2821e5
        08311b88a6ee14bedcbac7ce339994c0
        09bbbadf9444748e4ab9a91acbbc7301
        742dab74aa1be6847ad8e9f08c170359
        b87e0ccd480812aaaf847aff03c2e858
        1c55848c2b50f6c6608540fe82627a2c
        0f5ee37fbe9cdeab5f6c9799702bd303
        2bf733e2108d03247cd20edaa2c322e5
        bf086bfecc4ac97b61096f016c57d5d0
        1c24d398cefd5ae8131c1f51f172ce9c
        6d3b8395d396dcbd70b4af790018796b
        31f0b0ad6198f86e5e1f26e9258492

tag   : 221dd1b69afb4e0c149e0a058e471a4a
]]></sourcecode>
      </section>
      <section anchor="test-vector-7-medium-plaintext-with-ad">
        <name>Test Vector 7 - Medium plaintext with AD</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 5d9c3b7a8f2e6d4c1b9a8f7e6d5c4b3a
        2f1e0d9c8b7a6f5e4d3c2b1a0f9e8d7c

nonce : 8c5a7d3f9b1e6c4a2f8d5b9e3c7a1f6d

ad    : 95a6b7c8d9eafb0c1d2e3f5061728394
        a5b6c7d8e9fa0b1c2d3e4f60718293a4
        b5c6d7e8f90a1b2c3d4e5f708192a3b4
        c5d6e7f8091a2b3c4d5e6f8091a2b3c4

msg   : 32e14453e7a776781d4c4e2c3b23bca2
        441ee4213bc3df25021b5106c22c98e8
        a7b310142252c8dcff70a91d55cdc910
        3c1eccd9b5309ef21793a664e0d4b63c
        83530dcd1a6ad0feda6ff19153e9ee62
        0325c1cb979d7b32e54f41da3af1c169
        a24c47c1f6673e115f0cb73e8c507f15
        eedf155261962f2d175c9ba3832f4933
        fb330d28ad6aae787f12788706f45c92
        e72aea146959d2d4fa01869f7d072a7b
        f43b2e75265e1a000dde451b64658919
        e93143d2781955fb4ca2a38076ac9eb4
        9adc2b92b05f0ec7

ct    : 1d8d56867870574d1c4ac114620c6a2a
        bb44680fe321dd116601e2c92540f85a
        11c41dcac9814397b8f37b812cd52c93
        2db6ecbaa247c3e14f228bd792334570
        2fc43ad1eb1b8086e2c3c57bb602971c
        29772a35dfb1c45c66f81633e67fdc8d
        8005457ddbe4179312abab981049eb0a
        0a555b9fa01378878d7349111e2446fd
        e89ce64022d032cbf0cf2672e00d7999
        ed8b631c1b9bee547cbe464673464a4b
        80e8f72ad2b91a40fdcee5357980c090
        b34ab5e732e2a7df7613131ee42e42ec
        6ae9b05ac5683ebe

tag   : e93686b266c481196d44536eb51b5f2d
]]></sourcecode>
      </section>
      <section anchor="test-vector-8-single-byte-plaintext">
        <name>Test Vector 8 - Single byte plaintext</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 7b6a5f4e3d2c1b0a9f8e7d6c5b4a3f2e
        1d0c9b8a7f6e5d4c3b2a1f0e9d8c7b6a

nonce : 2e7c9f5d3b8a4c6f1e9b5d7a3f8c2e4a

ad    :

msg   : ff

ct    : 21

tag   : 3cf9020bd1cc59cc5f2f6ce19f7cbf68
]]></sourcecode>
      </section>
      <section anchor="test-vector-9-two-blocks-plaintext">
        <name>Test Vector 9 - Two blocks plaintext</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 4c8b7a9f3e5d2c6b1a8f9e7d6c5b4a3f
        2e1d0c9b8a7f6e5d4c3b2a1f0e9d8c7b

nonce : 7e3c9a5f1d8b4e6c2a9f5d7b3e8c1a4f

ad    : c3d4e5f60718293a4b5c6d7e8fa0b1c2
        d3e4f5061728394a5b6c7d8e9fb0c1d2
        e3f405162738495a6b7c8d9eafc0d1e2

msg   : aa55f00fcc339669aa55f00fcc339669
        aa55f00fcc339669aa55f00fcc339669

ct    : c2e199ac8c23ce6e3778e7fd0b4f8f75
        2badd4b67be0cdc3f6c98ae5f6fb0d25

tag   : 7aea3fbce699ceb1d0737e0483217745
]]></sourcecode>
      </section>
      <section anchor="test-vector-10-all-zeros-plaintext">
        <name>Test Vector 10 - All zeros plaintext</name>
        <sourcecode type="test-vectors"><![CDATA[
key   : 9e8d7c6b5a4f3e2d1c0b9a8f7e6d5c4b
        3a2f1e0d9c8b7a6f5e4d3c2b1a0f9e8d

nonce : 5f9d3b7e2c8a4f6d1b9e5c7a3d8f2b6e

ad    : daebfc0d1e2f405162738495a6b7c8d9

msg   : 00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000
        00000000000000000000000000000000

ct    : fc7f1142f681399099c5008980e73420
        65b4e62a9b9cb301bdf441d3282b6aa9
        3bd7cd735ef77755b4109f86b7c09083
        8e7b05f08ef4947946155a03ff483095
        152ef3dec8bdddae3990d00d41d5ee6c
        90dcf65dbed4b7ebbe9bb4ef096e1238
        d388bf15faacdb7a68be19dddc8a5b74
        216f4442bfa32d1dfccdc9c4020baec9

tag   : ad0b841c3d145a6ee86dc7b67338f113
]]></sourcecode>
      </section>
      <section anchor="test-vector-11-partial-block-ad-padding-demonstration">
        <name>Test Vector 11 - Partial-block AD (padding demonstration)</name>
        <t>This test vector specifically demonstrates the padding behavior when associated data length is not a multiple of the block size (128 bits). The AD is 13 bytes (104 bits), which requires 3 bytes (24 bits) of zero padding to reach the next block boundary.</t>
        <sourcecode type="test-vectors"><![CDATA[
key   : 1122334455667788112233445566778811
        223344556677881122334455667788

nonce : aabbccddeeff0011aabbccddeeff0011

ad    : 0102030405060708090a0b0c0d
        (13 bytes - padded to 16 bytes with zeros)

msg   : 48656c6c6f576f726c64
        (10 bytes)

ct    : 1fb0e0348c6a3a917133

tag   : 7d292173b55ba02dae56ac1224b7e775
]]></sourcecode>
      </section>
    </section>
    <section anchor="function-by-function-example">
      <name>Function-by-Function Example</name>
      <t>This appendix provides step-by-step examples of HiAE internal functions for implementers. All values are in hexadecimal. The examples use the following test data:</t>
      <ul spacing="normal">
        <li>
          <t>Key: <tt>0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef</tt></t>
        </li>
        <li>
          <t>Nonce: <tt>00112233445566778899aabbccddeeff</tt></t>
        </li>
        <li>
          <t>AD: <tt>48656c6c6f</tt> (5 bytes: “Hello”)</t>
        </li>
        <li>
          <t>Msg: <tt>576f726c64</tt> (5 bytes: “World”)</t>
        </li>
      </ul>
      <section anchor="aesl-function-example">
        <name>AESL Function Example</name>
        <t>The AESL function performs a single AES encryption round with a zero round key.</t>
        <artwork><![CDATA[
Input Block:  00112233445566778899aabbccddeeff

Output Block: 6379e6d9f467fb76ad063cf4d2eb8aa3
]]></artwork>
      </section>
      <section anchor="initialize-function-example">
        <name>Initialize Function Example</name>
        <t>The Initialize function sets up the initial state from the key and nonce.</t>
        <artwork><![CDATA[
Key:   0123456789abcdef0123456789abcdef
       0123456789abcdef0123456789abcdef
Nonce: 00112233445566778899aabbccddeeff

Initial state (before diffusion rounds):
  S0:  3243f6a8885a308d313198a2e0370734
  S1:  0123456789abcdef0123456789abcdef
  S2:  3243f6a8885a308d313198a2e0370734
  S3:  00112233445566778899aabbccddeeff
  S4:  00000000000000000000000000000000
  S5:  0123456789abcdef0123456789abcdef
  S6:  00000000000000000000000000000000
  S7:  4a4093822299f31d0082efa98ec4e6c8
  S8:  0123456789abcdef0123456789abcdef
  S9:  00000000000000000000000000000000
  S10: 01326754cdfeab9889baefdc45762310
  S11: 3243f6a8885a308d313198a2e0370734
  S12: 4a4093822299f31d0082efa98ec4e6c8
  S13: 0123456789abcdef0123456789abcdef
  S14: 00000000000000000000000000000000
  S15: 7803652aaac3c39031b3770b6ef3e1fc

State after Init (after diffusion):
  S0:  2a622bda4d229c9fc4b7d1a25399e321
  S1:  a04980e6407654f2760e59be74c05f9c
  S2:  308859e5787ab6c1705abbaecebfc316
  S3:  04782e5069799e9f3e325836a2ff3bcc
  S4:  007a12163596057152dc58a0f78cef2c
  S5:  7ce304cf04de20f8116cef51eea19e24
  S6:  c554da7a91164fc30e38c76ec038e66a
  S7:  3edcba33d2a5d02a4b598c5ffa003513
  S8:  50db6b4f18b7e282b8918311685abc18
  S9:  4253eebe1b72fec70ac3ec478cf9f2f2
  S10: 6bc09743dc45ba191c18a0d275ef9a8f
  S11: 251524aba97200f5b31eeeecb0f0a1c1
  S12: e1a99d3dd105e14085d6a0200f1d0c35
  S13: a4730f9d0f36ad7c67880342deed5310
  S14: 7d6ca34814e6e065c8cb4fa11ba2f8c4
  S15: 2b545cefe484f2e0ba5fb6359faffeca
]]></artwork>
      </section>
      <section anchor="update-function-example">
        <name>Update Function Example</name>
        <t>The Update function modifies the internal state with an input block.</t>
        <artwork><![CDATA[
Initial state (after initialization):
  S0:  2a622bda4d229c9fc4b7d1a25399e321
  S1:  a04980e6407654f2760e59be74c05f9c
  S2:  308859e5787ab6c1705abbaecebfc316
  S3:  04782e5069799e9f3e325836a2ff3bcc
  S4:  007a12163596057152dc58a0f78cef2c
  S5:  7ce304cf04de20f8116cef51eea19e24
  S6:  c554da7a91164fc30e38c76ec038e66a
  S7:  3edcba33d2a5d02a4b598c5ffa003513
  S8:  50db6b4f18b7e282b8918311685abc18
  S9:  4253eebe1b72fec70ac3ec478cf9f2f2
  S10: 6bc09743dc45ba191c18a0d275ef9a8f
  S11: 251524aba97200f5b31eeeecb0f0a1c1
  S12: e1a99d3dd105e14085d6a0200f1d0c35
  S13: a4730f9d0f36ad7c67880342deed5310
  S14: 7d6ca34814e6e065c8cb4fa11ba2f8c4
  S15: 2b545cefe484f2e0ba5fb6359faffeca

Input block: 48656c6c6f0000000000000000000000

After applying the Update function:
  S0:  a04980e6407654f2760e59be74c05f9c
  S1:  308859e5787ab6c1705abbaecebfc316
  S2:  4c1d423c06799e9f3e325836a2ff3bcc
  S3:  007a12163596057152dc58a0f78cef2c
  S4:  7ce304cf04de20f8116cef51eea19e24
  S5:  c554da7a91164fc30e38c76ec038e66a
  S6:  3edcba33d2a5d02a4b598c5ffa003513
  S7:  50db6b4f18b7e282b8918311685abc18
  S8:  4253eebe1b72fec70ac3ec478cf9f2f2
  S9:  6bc09743dc45ba191c18a0d275ef9a8f
  S10: 251524aba97200f5b31eeeecb0f0a1c1
  S11: e1a99d3dd105e14085d6a0200f1d0c35
  S12: ec1663f16036ad7c67880342deed5310
  S13: 7d6ca34814e6e065c8cb4fa11ba2f8c4
  S14: 2b545cefe484f2e0ba5fb6359faffeca
  S15: 4672d0d4a6a8fc93fe85701ff61a9e10
]]></artwork>
      </section>
      <section anchor="enc-function-example">
        <name>Enc Function Example</name>
        <t>The Enc function encrypts a single message block.</t>
        <artwork><![CDATA[
State (after processing AD "Hello"):
  S0:  a04980e6407654f2760e59be74c05f9c
  S1:  308859e5787ab6c1705abbaecebfc316
  S2:  4c1d423c06799e9f3e325836a2ff3bcc
  S3:  007a12163596057152dc58a0f78cef2c
  S4:  7ce304cf04de20f8116cef51eea19e24
  S5:  c554da7a91164fc30e38c76ec038e66a
  S6:  3edcba33d2a5d02a4b598c5ffa003513
  S7:  50db6b4f18b7e282b8918311685abc18
  S8:  4253eebe1b72fec70ac3ec478cf9f2f2
  S9:  6bc09743dc45ba191c18a0d275ef9a8f
  S10: 251524aba97200f5b31eeeecb0f0a1c1
  S11: e1a99d3dd105e14085d6a0200f1d0c35
  S12: ec1663f16036ad7c67880342deed5310
  S13: 7d6ca34814e6e065c8cb4fa11ba2f8c4
  S14: 2b545cefe484f2e0ba5fb6359faffeca
  S15: 4672d0d4a6a8fc93fe85701ff61a9e10

Message Block: 576f726c640000000000000000000000

Ciphertext Block: 03e5d2157300b718595429195c9278e7

Updated State after Enc:
  S0:  308859e5787ab6c1705abbaecebfc316
  S1:  4c1d423c06799e9f3e325836a2ff3bcc
  S2:  5715607a5196057152dc58a0f78cef2c
  S3:  7ce304cf04de20f8116cef51eea19e24
  S4:  c554da7a91164fc30e38c76ec038e66a
  S5:  3edcba33d2a5d02a4b598c5ffa003513
  S6:  50db6b4f18b7e282b8918311685abc18
  S7:  4253eebe1b72fec70ac3ec478cf9f2f2
  S8:  6bc09743dc45ba191c18a0d275ef9a8f
  S9:  251524aba97200f5b31eeeecb0f0a1c1
  S10: e1a99d3dd105e14085d6a0200f1d0c35
  S11: ec1663f16036ad7c67880342deed5310
  S12: 2a03d12470e6e065c8cb4fa11ba2f8c4
  S13: 2b545cefe484f2e0ba5fb6359faffeca
  S14: 4672d0d4a6a8fc93fe85701ff61a9e10
  S15: 9c56037e72109cee878398424f789257
]]></artwork>
      </section>
      <section anchor="finalize-function-example">
        <name>Finalize Function Example</name>
        <t>The Finalize function produces the authentication tag.</t>
        <artwork><![CDATA[
State (after processing the AD and message):
  S0:  308859e5787ab6c1705abbaecebfc316
  S1:  4c1d423c06799e9f3e325836a2ff3bcc
  S2:  5715607a5196057152dc58a0f78cef2c
  S3:  7ce304cf04de20f8116cef51eea19e24
  S4:  c554da7a91164fc30e38c76ec038e66a
  S5:  3edcba33d2a5d02a4b598c5ffa003513
  S6:  50db6b4f18b7e282b8918311685abc18
  S7:  4253eebe1b72fec70ac3ec478cf9f2f2
  S8:  6bc09743dc45ba191c18a0d275ef9a8f
  S9:  251524aba97200f5b31eeeecb0f0a1c1
  S10: e1a99d3dd105e14085d6a0200f1d0c35
  S11: ec1663f16036ad7c67880342deed5310
  S12: 2a03d12470e6e065c8cb4fa11ba2f8c4
  S13: 2b545cefe484f2e0ba5fb6359faffeca
  S14: 4672d0d4a6a8fc93fe85701ff61a9e10
  S15: 9c56037e72109cee878398424f789257

AD length:  5 bytes (40 bits)
Msg length: 5 bytes (40 bits)

Length encoding block: 2800000000000000 2800000000000000
                      (40 bits)        (40 bits)

Tag = S0 ^ S1 ^ ... ^ S15 = 45178cd06ef0a8bed8e9082fe49ec818
]]></artwork>
      </section>
      <section anchor="complete-encryption-example">
        <name>Complete Encryption Example</name>
        <artwork><![CDATA[
Key:       0123456789abcdef0123456789abcdef
           0123456789abcdef0123456789abcdef
Nonce:     00112233445566778899aabbccddeeff
AD:        48656c6c6f ("Hello")
Plaintext: 576f726c64 ("World")

Ciphertext: 03e5d21573
Tag:        45178cd06ef0a8bed8e9082fe49ec818
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The HiAE algorithm leverages the AES permutation invented by Joan Daemen and Vincent Rijmen.</t>
      <t>We would like to thank Samuel Lucas for his review of the draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
