HomeTEA/XTEA/XXTEA Online Encryption/Decryption

TEA/XTEA/XXTEA Online Encryption/Decryption

Online TEA/XTEA/XXTEA encryption/decryption tool, supporting CBC/ECB/CFB/OFB modes, widely used in embedded systems and game development

Security Notes

TEA/XTEA/XXTEA are mainly used for lightweight encryption in embedded systems and games. For applications requiring high security (e.g., banking, personal privacy), please use AES algorithm.

Input Format / Output Format

About TEA Family

The TEA (Tiny Encryption Algorithm) family includes three related block ciphers designed by Roger Needham and David Wheeler at Cambridge University. TEA was introduced in 1994, XTEA in 1997 to fix weaknesses in TEA, and XXTEA in 1998 as a variable-length block cipher.

Key Features

Extremely compact - can be implemented in a few lines of code
128-bit key offers reasonable security for most applications
Fast encryption/decryption on resource-constrained devices
No intellectual property restrictions - completely free to use

Algorithm Comparison

TEA: 64-bit block, 128-bit key, simple but has known weaknesses
XTEA: Improved key schedule, fixed TEA weaknesses, good security
XXTEA: Variable length block, better diffusion

Encryption Modes (TEA/XTEA only)

CBC: Cipher Block Chaining. Each block is XORed with the previous ciphertext block before encryption. Requires IV.
ECB: Electronic Codebook. Each block is encrypted independently. Simple but not recommended for most contexts.
CFB: Cipher Feedback. Converts block cipher into stream cipher. Self-synchronizing.
OFB: Output Feedback. Generates key stream independently. No error propagation.
RAW: Raw Block encryption. Single block direct encryption without chaining. No IV required.

Security Notes

TEA: suffer from equivalent keys and related-key attacks. Use XTEA or XXTEA instead.
XTEA: fixes TEA weaknesses with improved key schedule. Widely used and reasonably secure.
XXTEA: operates on variable-length blocks. Better diffusion but has some theoretical attacks.
TEA/XTEA/XXTEA are mainly used for lightweight encryption in embedded systems and games. For applications requiring high security (e.g., banking, personal privacy), please use AES algorithm.

Common Use Cases

Game asset encryption (Cocos2d-x, Unity assets)
IoT device communication encryption
Embedded systems with limited memory/CPU
Legacy system compatibility

Data is processed locally in your browser by default and will not be uploaded to any server. Upload will be clearly indicated if required.

© 2026 See-Tool. All rights reserved. | Contact Us