TEA/XTEA/XXTEA Online Encryption/Decryption
Online TEA/XTEA/XXTEA encryption/decryption tool, supporting CBC/ECB/CFB/OFB modes, widely used in embedded systems and game development
Security Notes
TEA/XTEA/XXTEA are mainly used for lightweight encryption in embedded systems and games. For applications requiring high security (e.g., banking, personal privacy), please use AES algorithm.
Input Format / Output Format
About TEA Family
The TEA (Tiny Encryption Algorithm) family includes three related block ciphers designed by Roger Needham and David Wheeler at Cambridge University. TEA was introduced in 1994, XTEA in 1997 to fix weaknesses in TEA, and XXTEA in 1998 as a variable-length block cipher.
Key Features
Extremely compact - can be implemented in a few lines of code
128-bit key offers reasonable security for most applications
Fast encryption/decryption on resource-constrained devices
No intellectual property restrictions - completely free to use
Algorithm Comparison
TEA: 64-bit block, 128-bit key, simple but has known weaknesses
XTEA: Improved key schedule, fixed TEA weaknesses, good security
XXTEA: Variable length block, better diffusion
Encryption Modes (TEA/XTEA only)
CBC: Cipher Block Chaining. Each block is XORed with the previous ciphertext block before encryption. Requires IV.
ECB: Electronic Codebook. Each block is encrypted independently. Simple but not recommended for most contexts.
CFB: Cipher Feedback. Converts block cipher into stream cipher. Self-synchronizing.
OFB: Output Feedback. Generates key stream independently. No error propagation.
RAW: Raw Block encryption. Single block direct encryption without chaining. No IV required.
Security Notes
TEA: suffer from equivalent keys and related-key attacks. Use XTEA or XXTEA instead.
XTEA: fixes TEA weaknesses with improved key schedule. Widely used and reasonably secure.
XXTEA: operates on variable-length blocks. Better diffusion but has some theoretical attacks.
TEA/XTEA/XXTEA are mainly used for lightweight encryption in embedded systems and games. For applications requiring high security (e.g., banking, personal privacy), please use AES algorithm.
Common Use Cases
Game asset encryption (Cocos2d-x, Unity assets)
IoT device communication encryption
Embedded systems with limited memory/CPU
Legacy system compatibility