Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 612))

  • 321 Accesses

Abstract

Tiny Encryption Algorithm (TEA) is a block cipher algorithm that uses symmetric key of 128-bits. It performs 32 rounds for encryption/decryption. TEA uses addition modulo \(2^{32}\), XoR, and shift operations in its algorithm. We convert TEA algorithm into nonlinear system of equations and solve the system using Satisfiability Modulo Theory solvers (SMT) on a desktop computer and also on high performance computing (HPC) facility. As solving system of equations is NP-complete problem, we tried solving the system for various number of rounds out of 32 rounds. The solver \(Z_3 (py)\), a Satisfiability Modulo Theories (SMT) solver, has been chosen to perform algebraic cryptanalysis. We could solve the system up to 5th round and found the actual secret key successfully among few solutions of high probable keys which we got from solver with in 15,576.34 min using HPC. Nonlinearity will increase as number of round increases, so solving high nonlinear system is very difficult. Our aim is to solve a specific kind of nonlinear system of equations. We tried to recover the partial keys for rounds greater than 5. Results of the key recovery are present in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • N. Bjørner, L. de Moura, L. Nachmanson, C.M. Wintersteiger, Programming Z3, in International Summer School on Engineering Trustworthy Software Systems (Springer, 2018), pp. 148–201

    Google Scholar 

  • R. Brummayer, Efficient SMT Solving for Bit-Vectors and the Extensional Theory of Arrays (Trauner, 2010)

    Google Scholar 

  • P.K. Gundaram, A.N. Tentu, N.B. Muppalaneni, Performance of various SMT solvers in cryptanalysis, in 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 298–303 (IEEE, 2021)

    Google Scholar 

  • S. Hong, D. Hong, Y. Ko, D. Chang, W. Lee, S. Lee, Differential cryptanalysis of TEA and XTEA, in International Conference on Information Security and Cryptology (Springer, 2003), pp. 402–417

    Google Scholar 

  • J. Kelsey, B. Schneier, D. Wagner, Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA, in Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol. 1334, ed. by Y. Han, T. Okamoto, S. Qing (Springer, Berlin, Heidelberg). https://doi.org/10.1007/BFb0028479

  • D. Moon, K. Hwang, W. Lee, S. Lee, J. Lim, Impossible differential cryptanalysis of reduced round XTEA and TEA, in International Workshop on Fast Software Encryption (Springer, 2002), pp. 49–60

    Google Scholar 

  • Rajashekarappa, K.M. Sunjiv Soyjaudah, K.A. Sumithra Devi, Study on cryptanalysis of the tiny encryption algorithm. Int. J. Innov. Technol. Expl. Eng. (IJITEE) 2, 88–91 (2013)

    Google Scholar 

  • H.K. Sahu, N.R. Pillai, I. Gupta et al., SMT solver-based cryptanalysis of block ciphers. SN Comput. Sci. 1, 169 (2020). https://doi.org/10.1007/s42979-020-00181-4

    Article  Google Scholar 

  • G. Sekar, N. Mouha, V. Velichkov, B. Preneel, Meet-in-the-middle attacks on reduced-round XTEA, in Cryptographers’ Track at the RSA Conference (Springer, 2011), pp. 250–267

    Google Scholar 

  • M. Shoeb, V.K. Gupta, A crypt analysis of the tiny encryption algorithm in key generation. Int. J. Commun. 10 (2012)

    Google Scholar 

  • D.J. Wheeler, R.M. Needham, TEA, a tiny encryption algorithm, in International Workshop on Fast Software Encryption (Springer, 1994), pp. 363–366

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nagendar Yerukala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Najim Alam, M., Gundaram, P.K., Yerukala, N. (2023). Cryptanalysis of Tiny Encryption Algorithm Based on SMT Solvers Using HPC. In: Reddy, A.B., Nagini, S., Balas, V.E., Raju, K.S. (eds) Proceedings of Third International Conference on Advances in Computer Engineering and Communication Systems. Lecture Notes in Networks and Systems, vol 612. Springer, Singapore. https://doi.org/10.1007/978-981-19-9228-5_6

Download citation

Publish with us

Policies and ethics