Differential cryptanalysis of tea and XTEA

Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee

Research output: Contribution to journalArticle

16 Citations (Scopus)

Abstract

TEA and XTEA are simple block ciphers consisting of exclusive-or, addition, and shift. Although their round functions are very simple and guarantee a little security, large number of 64 rounds have made them secure enough. It seems that the best result for TEA is the related-key attack in [3], but it is less reasonable than such attacks for one key as differential and linear attacks. Impossible differential attacks on 12-round TEA and 14-round XTEA are best results except for related-key attack [5]. We suggest differential and truncated differential attacks on TEA and XTEA better than them. Our best results on TEA and XTEA are attacks on 17-round TEA and 23-round XTEA.

Original languageEnglish
Pages (from-to)402-417
Number of pages16
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2971
Publication statusPublished - 2004 Dec 1

Fingerprint

Differential Cryptanalysis
Tea
Attack
Related-key Attack
Block Ciphers

Keywords

  • Block cipher
  • Differential cryptanalysis
  • TEA
  • Truncated differential cryptanalysis
  • XTEA

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Differential cryptanalysis of tea and XTEA. / Hong, Seokhie; Hong, Deukjo; Ko, Youngdai; Chang, Donghoon; Lee, Wonil; Lee, Sangjin.

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 2971, 01.12.2004, p. 402-417.

Research output: Contribution to journalArticle

@article{37ded6379a1b4b5083d7d0ac99f8eae7,
title = "Differential cryptanalysis of tea and XTEA",
abstract = "TEA and XTEA are simple block ciphers consisting of exclusive-or, addition, and shift. Although their round functions are very simple and guarantee a little security, large number of 64 rounds have made them secure enough. It seems that the best result for TEA is the related-key attack in [3], but it is less reasonable than such attacks for one key as differential and linear attacks. Impossible differential attacks on 12-round TEA and 14-round XTEA are best results except for related-key attack [5]. We suggest differential and truncated differential attacks on TEA and XTEA better than them. Our best results on TEA and XTEA are attacks on 17-round TEA and 23-round XTEA.",
keywords = "Block cipher, Differential cryptanalysis, TEA, Truncated differential cryptanalysis, XTEA",
author = "Seokhie Hong and Deukjo Hong and Youngdai Ko and Donghoon Chang and Wonil Lee and Sangjin Lee",
year = "2004",
month = "12",
day = "1",
language = "English",
volume = "2971",
pages = "402--417",
journal = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - Differential cryptanalysis of tea and XTEA

AU - Hong, Seokhie

AU - Hong, Deukjo

AU - Ko, Youngdai

AU - Chang, Donghoon

AU - Lee, Wonil

AU - Lee, Sangjin

PY - 2004/12/1

Y1 - 2004/12/1

N2 - TEA and XTEA are simple block ciphers consisting of exclusive-or, addition, and shift. Although their round functions are very simple and guarantee a little security, large number of 64 rounds have made them secure enough. It seems that the best result for TEA is the related-key attack in [3], but it is less reasonable than such attacks for one key as differential and linear attacks. Impossible differential attacks on 12-round TEA and 14-round XTEA are best results except for related-key attack [5]. We suggest differential and truncated differential attacks on TEA and XTEA better than them. Our best results on TEA and XTEA are attacks on 17-round TEA and 23-round XTEA.

AB - TEA and XTEA are simple block ciphers consisting of exclusive-or, addition, and shift. Although their round functions are very simple and guarantee a little security, large number of 64 rounds have made them secure enough. It seems that the best result for TEA is the related-key attack in [3], but it is less reasonable than such attacks for one key as differential and linear attacks. Impossible differential attacks on 12-round TEA and 14-round XTEA are best results except for related-key attack [5]. We suggest differential and truncated differential attacks on TEA and XTEA better than them. Our best results on TEA and XTEA are attacks on 17-round TEA and 23-round XTEA.

KW - Block cipher

KW - Differential cryptanalysis

KW - TEA

KW - Truncated differential cryptanalysis

KW - XTEA

UR - http://www.scopus.com/inward/record.url?scp=35048813090&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=35048813090&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:35048813090

VL - 2971

SP - 402

EP - 417

JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SN - 0302-9743

ER -