Re: TEA for real-life embedded project?



SM wrote:
Hi,

I'm developing a project which involves sending some small (at most 64
bytes) encrypted data packets to a microcontroller by an application. The
software never encrypts any packets, it just sends one of the previously
prepared and stored ones. This means that:
1. A chosen-plaintext attack is impossible,
2. A chosen-ciphertext attack is impossible (practically),
3. There is a possibility of at most a few hundred ciphertexts for which
some parts of the corresponding plaintexts are known.

Given such circumstances, would using the TEA cipher be unwise?
Unfortunately the project requires decryption speed which is hard to obtain
using AES.

I trust you're not literally using AES decryption on the limited resource end. You'd want to use encryption only, either via, say, CTR mode, or by just reversing the roles of encryption and decryption.

--Mike Amling
.



Relevant Pages

  • Re: TEA for real-life embedded project?
    ... bytes) encrypted data packets to a microcontroller by an application. ... the same ciphertext C always appears five minutes before the missile is ... then it's a pretty good bet that C corresponds to the encryption ... message authentication. ...
    (sci.crypt)
  • Re: Auto-update protocol
    ... to transfer even with a single client and no interference. ... shared secret/public key is the only way to do the encryption. ... successfully decryption is the authentication. ... you can get using a generic farm server, but TFTP does not have any ...
    (comp.arch.embedded)
  • Re: Securing data to a process principal
    ... encryption key first time for the user - and use it later). ... secret. ... I need the decryption to ... You MAY think that instead of a filter driver you can simply ...
    (microsoft.public.platformsdk.security)
  • Re: embedded keys - there has to be a less vulnerable approach
    ... the database would be run on top of an encrypting file system ... > The use of an asymmetrical encryption algorithm does not seem to offer ... because the encryption and decryption ... > a hostile attacker is not a member of that small knowledgeable elite. ...
    (comp.security.misc)
  • embedded keys - there has to be a less vulnerable approach
    ... the database would be run on top of an encrypting file system ... The use of an asymmetrical encryption algorithm does not seem to offer ... because the encryption and decryption ... You have a table with customer names and addresses. ...
    (comp.security.misc)