Related-key rectangle attack on 36 rounds of the XTEA block cipher

45Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

XTEA is a 64-round block cipher with a 64-bit block size and a 128-bit user key, which was designed as a short C program that would run safely on most computers. In this paper, we present a related-key rectangle attack on a series of inner 36 rounds of XTEA without making a weak key assumption, and a related-key rectangle attack on the first 36 rounds of XTEA under certain weak key assumptions. These are better than any previously published cryptanalytic results on XTEA in terms of the numbers of attacked rounds. © Springer-Verlag 2008.

Cite

CITATION STYLE

APA

Lu, J. (2009). Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security, 8(1), 1–11. https://doi.org/10.1007/s10207-008-0059-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free