1995
DOI: 10.1007/3-540-60590-8_29
|View full text |Cite
|
Sign up to set email alerts
|

TEA, a tiny encryption algorithm

Abstract: We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
196
0
5

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 352 publications
(201 citation statements)
references
References 1 publication
0
196
0
5
Order By: Relevance
“…In [29], Israsena presents a hardware implementation of the Tiny Encryption Algorithm (TEA) [70] on an IC of about three thousand gates and with a consumption of about seven microamps. It fits the timing requirements of basic EPC setups where hundred of tags must simultaneously be accessed by the same reader.…”
Section: Hardware Challenges and Limitationsmentioning
confidence: 99%
“…In [29], Israsena presents a hardware implementation of the Tiny Encryption Algorithm (TEA) [70] on an IC of about three thousand gates and with a consumption of about seven microamps. It fits the timing requirements of basic EPC setups where hundred of tags must simultaneously be accessed by the same reader.…”
Section: Hardware Challenges and Limitationsmentioning
confidence: 99%
“…They are Advanced Encryption Standard (AES) [4][5][6][7], Data Encryption Standard (DES) [8], Tiny Encryption Algorithm (TEA) [9,10], and Extended TEA (XTEA) [11]. These encryption algorithms are not suited to be implemented in a resource constrained system due to various complexities involved like i.e.…”
Section: Related Workmentioning
confidence: 99%
“…DES is more processor intensive, non-scalable and breakable by Linear Cryptanalysis. TEA [9] or Yuval"s proposal [10] is notable for its simplicity and implementable on various platforms (scalability). It works on 64 bit blocks and makes use of 128 bit key.…”
Section: Related Workmentioning
confidence: 99%
“…The use of a private key block cipher reduces the resource requirements and also the amount of cipher text produced. From the various available block ciphers TEA [4,5] is chosen as it is designed to reduce the memory footprint and maximize speed MD5 is used for authentication as it produces a standard 128 bit output for any given length of input text. Thus reducing the overall length of the request message The remainder of the paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%