General | |
---|---|
First published | 2008 |
Derived from | Corrected Block TEA |
Cipher detail | |
Key sizes | variable |
Block sizes | arbitrary, at least two words (64 bits) |
Structure | Unbalanced Feistel Network |
Rounds | 8 * (plaintext words) + 4 * (key words) |
Best public cryptanalysis | |
2480 complexity meet-in-the-middle preimage attack against EnRUPT hash,
[2]
collision attack with 240 time complexity
[3] |
EnRUPT is a block cipher and a family of cryptographic algorithms based on XXTEA. [1] [5] EnRUPT hash function was submitted to SHA-3 competition but it wasn't selected to the second round.
General | |
---|---|
First published | 2008 |
Derived from | Corrected Block TEA |
Cipher detail | |
Key sizes | variable |
Block sizes | arbitrary, at least two words (64 bits) |
Structure | Unbalanced Feistel Network |
Rounds | 8 * (plaintext words) + 4 * (key words) |
Best public cryptanalysis | |
2480 complexity meet-in-the-middle preimage attack against EnRUPT hash,
[2]
collision attack with 240 time complexity
[3] |
EnRUPT is a block cipher and a family of cryptographic algorithms based on XXTEA. [1] [5] EnRUPT hash function was submitted to SHA-3 competition but it wasn't selected to the second round.