846:
874:
826:
656:
509:
127:
372:
911:
68:
in 1994. The current version, published in 1997, is 3.0. SEAL, covered by two patents in the United States, both of which are assigned to
502:
434:
120:
57:
without having to start from the beginning. This makes it particularly well suited for applications like encrypting hard drives.
705:
429:
419:
495:
113:
50:
38:
935:
821:
776:
589:
700:
403:
262:
904:
816:
806:
796:
651:
398:
930:
801:
791:
594:
554:
547:
537:
532:
542:
849:
695:
641:
470:
444:
297:
897:
811:
735:
465:
42:
574:
393:
680:
664:
611:
460:
740:
730:
601:
881:
94:"Computer readable device implementing a software-efficient pseudorandom function encryption"
675:
242:
362:
357:
332:
206:
65:
61:
46:
750:
670:
631:
579:
564:
424:
277:
232:
924:
831:
786:
745:
725:
621:
584:
559:
377:
317:
307:
272:
136:
31:
781:
626:
616:
606:
569:
518:
23:
760:
312:
170:
720:
690:
685:
646:
439:
90:
82:
86:"Software-efficient pseudorandom function and the use thereof for encryption"
710:
352:
282:
216:
54:
873:
755:
715:
165:
211:
185:
160:
636:
302:
267:
237:
201:
347:
367:
342:
292:
287:
155:
150:
491:
109:
327:
322:
175:
69:
35:
53:
in that it can easily generate arbitrary portions of the
885:
657:
Cryptographically secure pseudorandom number generator
97:
769:
525:
453:
412:
386:
255:
225:
194:
184:
143:
28:SEAL (Software-Optimized Encryption Algorithm)
905:
503:
121:
8:
912:
898:
510:
496:
488:
191:
128:
114:
106:
102:
98:
45:with a reported performance of around 4
880:This cryptography-related article is a
7:
870:
868:
60:The first version was published by
884:. You can help Knowledge (XXG) by
14:
34:optimised for machines with a 32-
872:
845:
844:
706:Information-theoretic security
1:
420:block ciphers in stream mode
51:pseudorandom function family
822:Message authentication code
777:Cryptographic hash function
590:Cryptographic hash function
952:
867:
701:Harvest now, decrypt later
404:alternating step generator
840:
817:Post-quantum cryptography
487:
105:
101:
807:Quantum key distribution
797:Authenticated encryption
652:Random number generation
399:self-shrinking generator
802:Public-key cryptography
792:Symmetric-key algorithm
595:Key derivation function
555:Cryptographic primitive
548:Authentication protocol
538:Outline of cryptography
533:History of cryptography
543:Cryptographic protocol
49:. SEAL is actually a
696:End-to-end encryption
642:Cryptojacking malware
471:stream cipher attacks
91:U.S. patent 5,675,652
83:U.S. patent 5,454,039
812:Quantum cryptography
736:Trusted timestamping
466:correlation immunity
575:Cryptographic nonce
394:shrinking generator
144:Widely used ciphers
41:size and plenty of
936:Cryptography stubs
681:Subliminal channel
665:Pseudorandom noise
612:Key (cryptography)
461:correlation attack
893:
892:
862:
861:
858:
857:
741:Key-based routing
731:Trapdoor function
602:Digital signature
483:
482:
479:
478:
251:
250:
943:
914:
907:
900:
876:
869:
848:
847:
676:Insecure channel
512:
505:
498:
489:
192:
130:
123:
116:
107:
103:
99:
93:
85:
951:
950:
946:
945:
944:
942:
941:
940:
921:
920:
919:
918:
865:
863:
854:
836:
765:
521:
516:
475:
449:
408:
382:
247:
221:
180:
139:
134:
89:
81:
78:
66:Don Coppersmith
62:Phillip Rogaway
47:cycles per byte
20:
12:
11:
5:
949:
947:
939:
938:
933:
931:Stream ciphers
923:
922:
917:
916:
909:
902:
894:
891:
890:
877:
860:
859:
856:
855:
853:
852:
841:
838:
837:
835:
834:
829:
827:Random numbers
824:
819:
814:
809:
804:
799:
794:
789:
784:
779:
773:
771:
767:
766:
764:
763:
758:
753:
751:Garlic routing
748:
743:
738:
733:
728:
723:
718:
713:
708:
703:
698:
693:
688:
683:
678:
673:
671:Secure channel
668:
662:
661:
660:
649:
644:
639:
634:
632:Key stretching
629:
624:
619:
614:
609:
604:
599:
598:
597:
592:
582:
580:Cryptovirology
577:
572:
567:
565:Cryptocurrency
562:
557:
552:
551:
550:
540:
535:
529:
527:
523:
522:
517:
515:
514:
507:
500:
492:
485:
484:
481:
480:
477:
476:
474:
473:
468:
463:
457:
455:
451:
450:
448:
447:
442:
437:
432:
427:
425:shift register
422:
416:
414:
410:
409:
407:
406:
401:
396:
390:
388:
384:
383:
381:
380:
375:
370:
365:
360:
355:
350:
345:
340:
335:
330:
325:
320:
315:
310:
305:
300:
295:
290:
285:
280:
275:
270:
265:
259:
257:
253:
252:
249:
248:
246:
245:
240:
235:
229:
227:
223:
222:
220:
219:
214:
209:
204:
198:
196:
189:
182:
181:
179:
178:
173:
168:
163:
158:
153:
147:
145:
141:
140:
137:Stream ciphers
135:
133:
132:
125:
118:
110:
96:
95:
87:
77:
74:
18:
13:
10:
9:
6:
4:
3:
2:
948:
937:
934:
932:
929:
928:
926:
915:
910:
908:
903:
901:
896:
895:
889:
887:
883:
878:
875:
871:
866:
851:
843:
842:
839:
833:
832:Steganography
830:
828:
825:
823:
820:
818:
815:
813:
810:
808:
805:
803:
800:
798:
795:
793:
790:
788:
787:Stream cipher
785:
783:
780:
778:
775:
774:
772:
768:
762:
759:
757:
754:
752:
749:
747:
746:Onion routing
744:
742:
739:
737:
734:
732:
729:
727:
726:Shared secret
724:
722:
719:
717:
714:
712:
709:
707:
704:
702:
699:
697:
694:
692:
689:
687:
684:
682:
679:
677:
674:
672:
669:
666:
663:
658:
655:
654:
653:
650:
648:
645:
643:
640:
638:
635:
633:
630:
628:
625:
623:
622:Key generator
620:
618:
615:
613:
610:
608:
605:
603:
600:
596:
593:
591:
588:
587:
586:
585:Hash function
583:
581:
578:
576:
573:
571:
568:
566:
563:
561:
560:Cryptanalysis
558:
556:
553:
549:
546:
545:
544:
541:
539:
536:
534:
531:
530:
528:
524:
520:
513:
508:
506:
501:
499:
494:
493:
490:
486:
472:
469:
467:
464:
462:
459:
458:
456:
452:
446:
443:
441:
438:
436:
433:
431:
428:
426:
423:
421:
418:
417:
415:
411:
405:
402:
400:
397:
395:
392:
391:
389:
385:
379:
376:
374:
371:
369:
366:
364:
361:
359:
356:
354:
351:
349:
346:
344:
341:
339:
336:
334:
331:
329:
326:
324:
321:
319:
316:
314:
311:
309:
306:
304:
301:
299:
296:
294:
291:
289:
286:
284:
281:
279:
276:
274:
271:
269:
266:
264:
261:
260:
258:
256:Other ciphers
254:
244:
241:
239:
236:
234:
231:
230:
228:
224:
218:
215:
213:
210:
208:
205:
203:
200:
199:
197:
193:
190:
187:
183:
177:
174:
172:
169:
167:
164:
162:
159:
157:
154:
152:
149:
148:
146:
142:
138:
131:
126:
124:
119:
117:
112:
111:
108:
104:
100:
92:
88:
84:
80:
79:
75:
73:
71:
67:
63:
58:
56:
52:
48:
44:
40:
37:
33:
32:stream cipher
29:
25:
19:Stream cipher
17:
886:expanding it
879:
864:
782:Block cipher
627:Key schedule
617:Key exchange
607:Kleptography
570:Cryptosystem
519:Cryptography
337:
59:
27:
24:cryptography
21:
15:
770:Mathematics
761:Mix network
925:Categories
721:Ciphertext
691:Decryption
686:Encryption
647:Ransomware
440:T-function
387:Generators
263:Achterbahn
76:References
711:Plaintext
353:SOBER-128
283:KCipher-2
217:SOSEMANUK
188:Portfolio
55:keystream
850:Category
756:Kademlia
716:Codetext
659:(CSPRNG)
226:Hardware
195:Software
166:Crypto-1
526:General
454:Attacks
243:Trivium
212:Salsa20
186:eSTREAM
637:Keygen
413:Theory
363:Turing
358:Spritz
333:Scream
303:Phelix
298:Panama
268:F-FCSR
238:MICKEY
207:Rabbit
202:HC-128
161:ChaCha
667:(PRN)
435:NLFSR
348:SOBER
278:ISAAC
233:Grain
30:is a
882:stub
430:LFSR
378:WAKE
373:VMPC
368:VEST
343:SNOW
338:SEAL
328:RC4A
323:RC4+
318:QUAD
308:Pike
293:ORYX
288:MUGI
273:FISH
156:A5/2
151:A5/1
64:and
39:word
176:RC4
70:IBM
43:RAM
36:bit
22:In
927::
445:IV
313:Py
171:E0
72:.
26:,
913:e
906:t
899:v
888:.
511:e
504:t
497:v
129:e
122:t
115:v
16:ยง
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.