Table 6 Vulnerability Analysis and Attack Resilience Comparison5,14,17,24.

From: TTEA: designing a quantum-ready and energy-conscious encryption model for secure IoT environments

Attack Type

TTEA

TEA

Speck

Differential Cryptanalysis

High

Low

Medium

Linear Cryptanalysis

High

Low

Medium

Related-Key Attacks

High

Low

Low

Side-Channel Attacks

High

Low

Low

Quantum Attacks

High

Low

Low