Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/4391
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBagga, Amandeep-
dc.contributor.authorGanesan, Geetha-
dc.date.accessioned2019-12-28T09:27:34Z-
dc.date.available2019-12-28T09:27:34Z-
dc.date.issued2016-03-10-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/4391-
dc.description.abstractCiphers are vulnerable to different types of attacks which exploit them for their weaknesses. Since security is a vital and fundamental requirement in the current era of information system and communication process, even a little compromise can be detrimental. Whenever a security system is made, cryptanalysts over the world check it for robustness by opting different methods. Focusing on security of block ciphers, this paper mainly aims to discuss various types of attacks. This paper dwells on the complexity of Bitsum Algorithm but also classifies and compares different attacks based on their complexities. Five popular and strong algorithms were analyzed under Bitsum algorithm. FEAL, Blowfish, and AES were able to withstand Bitsum Attack whereas TEA and XTEA could not. This comparison has shown that the complexity of the Bitsum attack is least on Reduced TEA, TEA and XTEA.en_US
dc.language.isoenen_US
dc.publisherFar East Journal of Electronics and Communicationsen_US
dc.subjectTEA and XTEAen_US
dc.titleOn the complexity of algorithms affecting the security of TEA and XTEA (Only Abstract)en_US
dc.typeArticleen_US
Appears in Collections:E-Publication

Files in This Item:
File Description SizeFormat 
ON THE COMPLEXITY OF ALGORITHMS AFFECTING THE SECURITY OF TEA AND XTEA.docx10.68 kBMicrosoft Word XMLView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.