ISSN 2278-9723
 

Research Article 
. 2012; 1(1): 15-20


A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION

Mohammad Shoeb, Vishal Kumar Gupta.

Abstract
Encryption algorithms are used for security over wireless communications, but securing data also consumes resources. Major important factors to consider when designing a cryptographic system are performance, speed, size, and security. Tiny Encryption Algorithm (TEA), and the Extension of TEA (XTEA) are examples of cryptographic algorithms. There is a requirement to specify cryptographic strength in an objective manner rather than describing it using subjective descriptors such as weak, strong, acceptable etc. This paper proposes the Study on a Tiny Encryption Algorithm. The Tiny Encryption Algorithm (TEA) is a cryptographic algorithm designed to minimize memory footprint and maximize speed. It is a Feistel type cipher that uses operations from mixed (orthogonal) algebraic groups. In this Paper, we propose Tiny Encryption Algorithm (TEA) to some standard for random number generator tests.

Key words: Data Encryption Standard, Cryptography, TEA (Tiny Encryption Algorithm), XTEA (Extension of Tiny Encryption Algorithm), cryptographic system, RC2, Blowfish, and AES


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Mohammad Shoeb
Articles by Vishal Kumar Gupta
on Google
on Google Scholar

How to Cite this Article
Pubmed Style

Mohammad Shoeb, Vishal Kumar Gupta. A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION . . 2012; 1(1): 15-20.


Web Style

Mohammad Shoeb, Vishal Kumar Gupta. A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION . http://www.ijccts.org/?mno=302643835 [Access: September 19, 2020].


AMA (American Medical Association) Style

Mohammad Shoeb, Vishal Kumar Gupta. A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION . . 2012; 1(1): 15-20.



Vancouver/ICMJE Style

Mohammad Shoeb, Vishal Kumar Gupta. A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION . . (2012), [cited September 19, 2020]; 1(1): 15-20.



Harvard Style

Mohammad Shoeb, Vishal Kumar Gupta (2012) A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION . , 1 (1), 15-20.



Turabian Style

Mohammad Shoeb, Vishal Kumar Gupta. 2012. A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION . International Journal of Communication and Computer Technologies, 1 (1), 15-20.



Chicago Style

Mohammad Shoeb, Vishal Kumar Gupta. "A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION ." International Journal of Communication and Computer Technologies 1 (2012), 15-20.



MLA (The Modern Language Association) Style

Mohammad Shoeb, Vishal Kumar Gupta. "A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION ." International Journal of Communication and Computer Technologies 1.1 (2012), 15-20. Print.



APA (American Psychological Association) Style

Mohammad Shoeb, Vishal Kumar Gupta (2012) A CRYPT ANALYSIS OF THE TINY ENCRYPTION ALGORITHM IN KEY GENERATION . International Journal of Communication and Computer Technologies, 1 (1), 15-20.





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles