Table 6 Vulnerability Analysis and Attack Resilience Comparison5,14,17,24.
From: TTEA: designing a quantum-ready and energy-conscious encryption model for secure IoT environments
Attack Type | TTEA | TEA | Speck |
|---|---|---|---|
Differential Cryptanalysis | High | Low | Medium |
Linear Cryptanalysis | High | Low | Medium |
Related-Key Attacks | High | Low | Low |
Side-Channel Attacks | High | Low | Low |
Quantum Attacks | High | Low | Low |