2008
DOI: 10.1007/978-3-540-89754-5_28
|View full text |Cite
|
Sign up to set email alerts
|

Chai-Tea, Cryptographic Hardware Implementations of xTEA

Abstract: Abstract. The tiny encryption algorithm (TEA) was developed by Wheeler and Needham as a simple computer program for encryption. This paper is the first design-space exploration for hardware implementations of the extended tiny encryption algorithm. It presents efficient implementations of XTEA on FPGAs and ASICs for ultra-low power applications such as RFID tags and wireless sensor nodes as well as fully pipelined designs for high speed applications. A novel ultra-low power implementation is introduced which c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
38
0
1

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 86 publications
(39 citation statements)
references
References 23 publications
0
38
0
1
Order By: Relevance
“…They are Advanced Encryption Standard (AES) [4][5][6][7], Data Encryption Standard (DES) [8], Tiny Encryption Algorithm (TEA) [9,10], and Extended TEA (XTEA) [11]. These encryption algorithms are not suited to be implemented in a resource constrained system due to various complexities involved like i.e.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They are Advanced Encryption Standard (AES) [4][5][6][7], Data Encryption Standard (DES) [8], Tiny Encryption Algorithm (TEA) [9,10], and Extended TEA (XTEA) [11]. These encryption algorithms are not suited to be implemented in a resource constrained system due to various complexities involved like i.e.…”
Section: Related Workmentioning
confidence: 99%
“…So in terms of security TEA is insecure. XTEA [11] was an advanced version of TEA, mainly aimed at improving all the security glitches. XTEA has complex key scheduling and rearrangement of Shift XOR and addition operations.…”
Section: Related Workmentioning
confidence: 99%
“…Following these studies, a significant number of research investigations appeared emphasizing different techniques for hardware implementation. Some studies focused on software rather than hardware implementations of TEA and XTEA algorithms, such as [6]- [12]. A few major efforts have studied both hardware and software aspects of TEA for cost effective use of RFID applications [13] [14] [15] [16].…”
Section: Introductionmentioning
confidence: 99%
“…In [6] the author studied XTEA implementation on both the ASIC and FPGA programmable logic platforms. The FPGA implementation used Xilinx ISE 9.1 tools with Xilinx Virtex 5 and Spartan 3 FPGAs, containing the XC3S50-5 and XC3S200-5 FPGA devices, respectively, and reached a real-time encryption throughput rate of 36 Mb/s.…”
Section: Introductionmentioning
confidence: 99%
“…Early work focuses on optimizing hardware implementations of standardized block ciphers such as AES [16], IDEA [25] and XTEA [22]. Later on, researchers have shown how to modify a classical block cipher like DES [24] for lightweight applications.…”
Section: Introductionmentioning
confidence: 99%