scispace - formally typeset
Search or ask a question
Topic

Tiny Encryption Algorithm

About: Tiny Encryption Algorithm is a research topic. Over the lifetime, 132 publications have been published within this topic receiving 3353 citations. The topic is also known as: TEA.


Papers
More filters
Book ChapterDOI
09 Dec 1993
TL;DR: Blowfish, a new secret-key block cipher, is proposed, a Feistel network, iterating a simple encryption function 16 times, which is very efficient on large microprocessors.
Abstract: Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can take place, the actual encryption of data is very efficient on large microprocessors.

893 citations

Book ChapterDOI
14 Dec 1994
TL;DR: This paper gives a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
Abstract: We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.

575 citations

01 Jan 1998
TL;DR: A new block cipher is proposed that uses S-boxes similar to those of DES in a new structure that simultaneously allows a more rapid avalanche, a more efficient bitslice implementation, and an easy analysis that enables it to be more secure than three-key triple-DES.
Abstract: We propose a new block cipher as a candidate for the Advanced Encryption Standard. Its design is highly conservative, yet still allows a very efficient implementation. It uses S-boxes similar to those of DES in a new structure that simultaneously allows a more rapid avalanche, a more efficient bitslice implementation, and an easy analysis that enables us to demonstrate its security against all known types of attack. With a 128-bit block size and a 256-bit key, it is as fast as DES on the market leading Intel Pentium/MMX platforms (and at least as fast on many others); yet we believe it to be more secure than three-key triple-DES.

433 citations

Book ChapterDOI
19 Aug 2013
TL;DR: A new block cipher LEA, which has 128-bit block size and 128, 192, or 256-bit key size is proposed, which provides a high-speed software encryption on general-purpose processors and is secure against all the existing attacks on block ciphers.
Abstract: We propose a new block cipher LEA, which has 128-bit block size and 128, 192, or 256-bit key size. It provides a high-speed software encryption on general-purpose processors. Our experiments show that LEA is faster than AES on Intel, AMD, ARM, and ColdFire platforms. LEA can be also implemented to have tiny code size. Its hardware implementation has a competitive throughput per area. It is secure against all the existing attacks on block ciphers.

193 citations

Book ChapterDOI
14 Dec 2008
TL;DR: This paper is the first design-space exploration for hardware implementations of the extended tiny encryption algorithm XTEA on FPGAs and ASICs for ultra-low power applications such as RFID tags and wireless sensor nodes as well as fully pipelined designs for high speed applications.
Abstract: The tiny encryption algorithm (TEA) was developed by [4] Wheeler and Needham as a simple computer program for encryption. This paper is the first design-space exploration for hardware implementations of the extended tiny encryption algorithm. It presents efficient implementations of XTEA on FPGAs and ASICs for ultra-low power applications such as RFID tags and wireless sensor nodes as well as fully pipelined designs for high speed applications. A novel ultra-low power implementation is introduced which consumes less area and energy than a comparable AES implementation. Furthermore, XTEA is compared with stream ciphers from the eSTREAM portfolio and lightweight ciphers. The high speed implementations of XTEA operate at 20.6 Gbps (FPGA) or 36.6 Gbps (ASIC).

127 citations

Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
74% related
Cryptography
37.3K papers, 854.5K citations
73% related
Intrusion detection system
28.4K papers, 509.5K citations
71% related
Public-key cryptography
27.2K papers, 547.7K citations
70% related
Authentication
74.7K papers, 867.1K citations
69% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
202010
20199
20188
20174
20168