I've read in Wiki that XXTEA cipher is vulnerable to "a chosen-plaintext attack requiring 2^59 queries". I'dont exactly understand how bad is that, but something tell me that it's extremely hard to implement such attack on practice. Am I right?
Another question: is it possible just to increase number of rounds to make it stronger? I mean, instead of this:
q = 6 + 52/n;
do this:
q = X + 52/n; //where X - any number greater than 6
Is that correct change of code? How else this algo can be fixed?