Warning This library is implemented for research purposes only! It intentionally doesn't verify some parameters for validity. In real world all parameters MUST be properly verified.
Furthermore, this implementation doesn't hide internal context fields, because they are used in analysis.
TETRA algorithms implementation for research purposes.
- TETRA
- TEA (TETRA Encryption Algorithm)
- First known to me public implementation of TETRA cryptographic algorithms (by Midnight Blue team)
- All cops are broadcasting: TETRA under scrutiny (article by Midnight Blue team)