TEA, a tiny encryption algorithm

  • David J. Wheeler
  • Roger M. Needham
Session 8: Recent Results
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1008)

Abstract

We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.

References

  1. 1.
    National Institute of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46. January 1977Google Scholar
  2. 2.
    E. Biham and A. Shamir, Differential Analysis of the Data Encryption Standard, Springer-Verlag, 1993Google Scholar
  3. 3.
    B. Schneier, Applied Cryptology, John Wiley & sons, New York 1994.Google Scholar

Copyright information

© Springer-Verlag 1995

Authors and Affiliations

  • David J. Wheeler
    • 1
  • Roger M. Needham
    • 1
  1. 1.Computer LaboratoryCambridge UniversityEngland

Personalised recommendations