Knowledge (XXG)

SEAL (cipher)

Source ๐Ÿ“

846: 874: 826: 656: 509: 127: 372: 911: 68:
in 1994. The current version, published in 1997, is 3.0. SEAL, covered by two patents in the United States, both of which are assigned to
502: 434: 120: 57:
without having to start from the beginning. This makes it particularly well suited for applications like encrypting hard drives.
705: 429: 419: 495: 113: 50: 38: 935: 821: 776: 589: 700: 403: 262: 904: 816: 806: 796: 651: 398: 930: 801: 791: 594: 554: 547: 537: 532: 542: 849: 695: 641: 470: 444: 297: 897: 811: 735: 465: 42: 574: 393: 680: 664: 611: 460: 740: 730: 601: 881: 94:"Computer readable device implementing a software-efficient pseudorandom function encryption" 675: 242: 362: 357: 332: 206: 65: 61: 46: 750: 670: 631: 579: 564: 424: 277: 232: 924: 831: 786: 745: 725: 621: 584: 559: 377: 317: 307: 272: 136: 31: 781: 626: 616: 606: 569: 518: 23: 760: 312: 170: 720: 690: 685: 646: 439: 90: 82: 86:"Software-efficient pseudorandom function and the use thereof for encryption" 710: 352: 282: 216: 54: 873: 755: 715: 165: 211: 185: 160: 636: 302: 267: 237: 201: 347: 367: 342: 292: 287: 155: 150: 491: 109: 327: 322: 175: 69: 35: 53:
in that it can easily generate arbitrary portions of the
885: 657:
Cryptographically secure pseudorandom number generator
97: 769: 525: 453: 412: 386: 255: 225: 194: 184: 143: 28:SEAL (Software-Optimized Encryption Algorithm) 905: 503: 121: 8: 912: 898: 510: 496: 488: 191: 128: 114: 106: 102: 98: 45:with a reported performance of around 4 880:This cryptography-related article is a 7: 870: 868: 60:The first version was published by 884:. You can help Knowledge (XXG) by 14: 34:optimised for machines with a 32- 872: 845: 844: 706:Information-theoretic security 1: 420:block ciphers in stream mode 51:pseudorandom function family 822:Message authentication code 777:Cryptographic hash function 590:Cryptographic hash function 952: 867: 701:Harvest now, decrypt later 404:alternating step generator 840: 817:Post-quantum cryptography 487: 105: 101: 807:Quantum key distribution 797:Authenticated encryption 652:Random number generation 399:self-shrinking generator 802:Public-key cryptography 792:Symmetric-key algorithm 595:Key derivation function 555:Cryptographic primitive 548:Authentication protocol 538:Outline of cryptography 533:History of cryptography 543:Cryptographic protocol 49:. SEAL is actually a 696:End-to-end encryption 642:Cryptojacking malware 471:stream cipher attacks 91:U.S. patent 5,675,652 83:U.S. patent 5,454,039 812:Quantum cryptography 736:Trusted timestamping 466:correlation immunity 575:Cryptographic nonce 394:shrinking generator 144:Widely used ciphers 41:size and plenty of 936:Cryptography stubs 681:Subliminal channel 665:Pseudorandom noise 612:Key (cryptography) 461:correlation attack 893: 892: 862: 861: 858: 857: 741:Key-based routing 731:Trapdoor function 602:Digital signature 483: 482: 479: 478: 251: 250: 943: 914: 907: 900: 876: 869: 848: 847: 676:Insecure channel 512: 505: 498: 489: 192: 130: 123: 116: 107: 103: 99: 93: 85: 951: 950: 946: 945: 944: 942: 941: 940: 921: 920: 919: 918: 865: 863: 854: 836: 765: 521: 516: 475: 449: 408: 382: 247: 221: 180: 139: 134: 89: 81: 78: 66:Don Coppersmith 62:Phillip Rogaway 47:cycles per byte 20: 12: 11: 5: 949: 947: 939: 938: 933: 931:Stream ciphers 923: 922: 917: 916: 909: 902: 894: 891: 890: 877: 860: 859: 856: 855: 853: 852: 841: 838: 837: 835: 834: 829: 827:Random numbers 824: 819: 814: 809: 804: 799: 794: 789: 784: 779: 773: 771: 767: 766: 764: 763: 758: 753: 751:Garlic routing 748: 743: 738: 733: 728: 723: 718: 713: 708: 703: 698: 693: 688: 683: 678: 673: 671:Secure channel 668: 662: 661: 660: 649: 644: 639: 634: 632:Key stretching 629: 624: 619: 614: 609: 604: 599: 598: 597: 592: 582: 580:Cryptovirology 577: 572: 567: 565:Cryptocurrency 562: 557: 552: 551: 550: 540: 535: 529: 527: 523: 522: 517: 515: 514: 507: 500: 492: 485: 484: 481: 480: 477: 476: 474: 473: 468: 463: 457: 455: 451: 450: 448: 447: 442: 437: 432: 427: 425:shift register 422: 416: 414: 410: 409: 407: 406: 401: 396: 390: 388: 384: 383: 381: 380: 375: 370: 365: 360: 355: 350: 345: 340: 335: 330: 325: 320: 315: 310: 305: 300: 295: 290: 285: 280: 275: 270: 265: 259: 257: 253: 252: 249: 248: 246: 245: 240: 235: 229: 227: 223: 222: 220: 219: 214: 209: 204: 198: 196: 189: 182: 181: 179: 178: 173: 168: 163: 158: 153: 147: 145: 141: 140: 137:Stream ciphers 135: 133: 132: 125: 118: 110: 96: 95: 87: 77: 74: 18: 13: 10: 9: 6: 4: 3: 2: 948: 937: 934: 932: 929: 928: 926: 915: 910: 908: 903: 901: 896: 895: 889: 887: 883: 878: 875: 871: 866: 851: 843: 842: 839: 833: 832:Steganography 830: 828: 825: 823: 820: 818: 815: 813: 810: 808: 805: 803: 800: 798: 795: 793: 790: 788: 787:Stream cipher 785: 783: 780: 778: 775: 774: 772: 768: 762: 759: 757: 754: 752: 749: 747: 746:Onion routing 744: 742: 739: 737: 734: 732: 729: 727: 726:Shared secret 724: 722: 719: 717: 714: 712: 709: 707: 704: 702: 699: 697: 694: 692: 689: 687: 684: 682: 679: 677: 674: 672: 669: 666: 663: 658: 655: 654: 653: 650: 648: 645: 643: 640: 638: 635: 633: 630: 628: 625: 623: 622:Key generator 620: 618: 615: 613: 610: 608: 605: 603: 600: 596: 593: 591: 588: 587: 586: 585:Hash function 583: 581: 578: 576: 573: 571: 568: 566: 563: 561: 560:Cryptanalysis 558: 556: 553: 549: 546: 545: 544: 541: 539: 536: 534: 531: 530: 528: 524: 520: 513: 508: 506: 501: 499: 494: 493: 490: 486: 472: 469: 467: 464: 462: 459: 458: 456: 452: 446: 443: 441: 438: 436: 433: 431: 428: 426: 423: 421: 418: 417: 415: 411: 405: 402: 400: 397: 395: 392: 391: 389: 385: 379: 376: 374: 371: 369: 366: 364: 361: 359: 356: 354: 351: 349: 346: 344: 341: 339: 336: 334: 331: 329: 326: 324: 321: 319: 316: 314: 311: 309: 306: 304: 301: 299: 296: 294: 291: 289: 286: 284: 281: 279: 276: 274: 271: 269: 266: 264: 261: 260: 258: 256:Other ciphers 254: 244: 241: 239: 236: 234: 231: 230: 228: 224: 218: 215: 213: 210: 208: 205: 203: 200: 199: 197: 193: 190: 187: 183: 177: 174: 172: 169: 167: 164: 162: 159: 157: 154: 152: 149: 148: 146: 142: 138: 131: 126: 124: 119: 117: 112: 111: 108: 104: 100: 92: 88: 84: 80: 79: 75: 73: 71: 67: 63: 58: 56: 52: 48: 44: 40: 37: 33: 32:stream cipher 29: 25: 19:Stream cipher 17: 886:expanding it 879: 864: 782:Block cipher 627:Key schedule 617:Key exchange 607:Kleptography 570:Cryptosystem 519:Cryptography 337: 59: 27: 24:cryptography 21: 15: 770:Mathematics 761:Mix network 925:Categories 721:Ciphertext 691:Decryption 686:Encryption 647:Ransomware 440:T-function 387:Generators 263:Achterbahn 76:References 711:Plaintext 353:SOBER-128 283:KCipher-2 217:SOSEMANUK 188:Portfolio 55:keystream 850:Category 756:Kademlia 716:Codetext 659:(CSPRNG) 226:Hardware 195:Software 166:Crypto-1 526:General 454:Attacks 243:Trivium 212:Salsa20 186:eSTREAM 637:Keygen 413:Theory 363:Turing 358:Spritz 333:Scream 303:Phelix 298:Panama 268:F-FCSR 238:MICKEY 207:Rabbit 202:HC-128 161:ChaCha 667:(PRN) 435:NLFSR 348:SOBER 278:ISAAC 233:Grain 30:is a 882:stub 430:LFSR 378:WAKE 373:VMPC 368:VEST 343:SNOW 338:SEAL 328:RC4A 323:RC4+ 318:QUAD 308:Pike 293:ORYX 288:MUGI 273:FISH 156:A5/2 151:A5/1 64:and 39:word 176:RC4 70:IBM 43:RAM 36:bit 22:In 927:: 445:IV 313:Py 171:E0 72:. 26:, 913:e 906:t 899:v 888:. 511:e 504:t 497:v 129:e 122:t 115:v 16:ยง

Index

cryptography
stream cipher
bit
word
RAM
cycles per byte
pseudorandom function family
keystream
Phillip Rogaway
Don Coppersmith
IBM
U.S. patent 5,454,039
U.S. patent 5,675,652
v
t
e
Stream ciphers
A5/1
A5/2
ChaCha
Crypto-1
E0
RC4
eSTREAM
HC-128
Rabbit
Salsa20
SOSEMANUK
Grain
MICKEY

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘