Roger Needham pioneered the idea of protecting passwords with a one-way hash and built the basis upon which the Kerberos protocol is built.
But he just couldn't catch a break with designing block ciphers, even though they are all very elegant.
TEA, XTEA, Block TEA, and XXTEA are all either weak or broken.
There is an "XTEA2" cipher was designed by Alexander Pukall, released in 2006. I can't find any analysis on it however.
We love the four freedoms, and we want others to be able to enjoy them as well. Read about the four freedoms of #FreeSoftware: https://u.fsf.org/2cj
Weekly Linux and open source news, now expanded to potentially 15 minutes or less, still with no ads and no chatter.
I have been gaming since 1992 and building PCs since 2003. I enjoy Linux, supporting FOSS projects and am a tinfoil hat connoisseur.