Talk:XTEA
From Wikipedia, the free encyclopedia
Contents |
[edit] This looks bad in Firefox 1.0
I don't know how this page looks in MSIE 5/6, but in Firefox 1.0, there is a problem with the layout: The source code for TEA overlaps the floating diagram in the upper right hand corner describing TEA. Samboy 11:16, 21 Jan 2005 (UTC)
- OK, in MSIE 5 it puts the text in question in its own scrollbox, complete with a scrollbar, so that it doesn't overlap. OK, I'm going to make this page look decent in both MSIE 5 and in Firefox 1.0 Samboy 10:29, 22 Jan 2005 (UTC)
-
- This is a bigger problem than I thought at first; the bug is in the code that the mediawiki software uses. I'll work around it, but this looks like something I should bring up to village pump. Samboy 07:26, 23 Jan 2005 (UTC)
[edit] About the initial value of sum
The example code for deciphering showed sum being initialized to a constant value (delta * 32).
If one looks in the xtea paper it becomes clear that the value sum should be initialized is in fact number of rounds times the delta constant. This means that the example code would only work for implementations with 32 rounds. I have fixed the code to take an additional parameter with the number of rounds, but I wanted to to explain the change too.
--Joachim Strombergson 15:53, 7 June 2006
[edit] 64-bit cleanliness
Should we rewrite the code to be 64-bit clean?
If so, should we use u_int32_t (sys/types.h) or uint32_t (Stdint.h)?
--bitwiseshiftleft —Preceding unsigned comment added by 171.66.51.171 (talk) 22:34, 26 September 2007 (UTC)
[edit] What about AES?
I would like to have this page compare XTEA to AES. Isn't that also small and easy to implement? Which is stronger? —Preceding unsigned comment added by Simsong (talk • contribs) 19:22, 4 October 2007 (UTC)
- There is no definitive answer, and Wikipedia does not publish original research; Wikipedia is definitely in no position of authority to tell that one's better than the other.
- If you want a trustworthy answer you should consult a real cryptographer, but for what it's worth, AES is much more thoroughly cryptanalysed and understood, so you can't go wrong with it. Of course if you're developing cryptography software, the cipher is the least of your worries; rogue protocols and implementations are a far easier target for cryptanalysis, and are broken much more often. -- intgr [talk] 14:34, 26 December 2007 (UTC)