The implementation of the TEA symmetric encryption is not portable between all machine architectures. Explain why. How could a message encrypted using the TEA implementation be transmitted to decrypt it correctly on all other architectures?

What will be an ideal response?

Byte ordering is an issue. The algorithm as presented assumes that the 4 bytes in a 32-bit word are ordered the same at the sender (encrypter) and the receiver (decrypter). To make it work for all architectures, we would need to transmit messages in a network-standard byte order, and to re-order the bytes to suite the local architecture on receipt.

Computer Science & Information Technology

You might also like to view...

The current tab stops are indicated on the ________ ruler

Fill in the blank(s) with correct word

Computer Science & Information Technology

The computer must set up a section in its memory every time a new method is called - except when the new method is a copy of an existing method.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology