Differential Cryptanalysis of TEA and XTEA

  • Seokhie Hong
  • Deukjo Hong
  • Youngdai Ko
  • Donghoon Chang
  • Wonil Lee
  • Sangjin Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2971)

Abstract

TEA and XTEA are simple block ciphers consisting of exclusive-or, addition, and shift. Although their round functions are very simple and guarantee a little security, large number of 64 rounds have made them secure enough. It seems that the best result for TEA is the related-key attack [3], but it is less reasonable than such attacks for one key as differential and linear attacks. Impossible differential attacks on 12-round TEA and 14-round XTEA are best results except for related-key attack [5]. We suggest differential and truncated differential attacks on TEA and XTEA better than them. Our best results on TEA and XTEA are attacks on 17-round TEA and 23-round XTEA.

Keywords

Block cipher TEA XTEA differential cryptanalysis truncated differential cryptanalysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)Google Scholar
  2. 2.
    Hong, D., Ko, Y., Chang, D., Lee, W., Lim, J.: Differential Cryptanalysis of XTEA, Available on http://cist.korea.ac.kr/Tr/TR03-13.ps
  3. 3.
    Kelsey, J., Schneir, B., Wagner, D.: Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 203–207. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  4. 4.
    Knudsen, L.R.: Truncated and Higher Order Differential. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 229–236. Springer, Heidelberg (1995)Google Scholar
  5. 5.
    Moon, D., Hwang, K., Lee, W., Lee, S., Lim, J.: Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 49–60. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Wheeler, D.J., Needham, R.M.: TEA, a Tiny Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 97–110. Springer, Heidelberg (1995)Google Scholar
  7. 7.
    Needham, R.M., Wheeler, D.J.: eXtended Tiny Encryption Algorithm (October 1997), Available on http://vader.brad.ac.uk/tea/tea.shtml

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Seokhie Hong
    • 1
  • Deukjo Hong
    • 1
  • Youngdai Ko
    • 1
  • Donghoon Chang
    • 1
  • Wonil Lee
    • 1
  • Sangjin Lee
    • 1
  1. 1.Center for Information Security Technologies(CIST) Korea UniversitySeoulKorea

Personalised recommendations