1885:
193:
in the recursiveness of its structure: the 128-bit full cipher is a
Feistel network with an F-function operating on 64-bit halves, while the F-function itself is a Feistel network composed of a G-function operating on 32-bit halves. However the recursion does not extend further because the G-function
243:
as of 3.5.4 supports SEED as a TLS cipher; however, Mozilla decided to drop the support of SEED by default in
Firefox 27 and above because support for SEED has not had any practical positive effect in terms of helping South Korea migrate away from ActiveX-based e-commerce, and other browsers are not
157:-based technologies will be employed as they operate on many platforms, including mobile devices. Starting with the private sector, the ministry plans to expand this further to ultimately remove this dependency from public websites as well.
194:
is not a
Feistel network. In the G-function, the 32-bit word is considered as four 8-bit bytes, each of which is passed through one or the other of the S-boxes, then combined in a moderately complex set of
1865:
1695:
487:
134:
was not considered strong enough, so the Korea
Information Security Agency developed its own standard. However, this decision has historically limited the competition of
205:, generating its thirty-two 32-bit subkeys through application of its G-function on a series of rotations of the raw key, combined with round constants derived (as in
1548:
1483:
564:
150:
1310:
666:
1300:
794:
299:
1201:
1463:
1437:
1305:
153:(MSIP) announced its plan to remove the ActiveX dependency from at least 90 percent of the country's top 100 websites by 2017. Instead,
123:
40:
484:
1278:
1928:
1541:
1923:
1447:
557:
407:
1326:
1744:
1504:
1534:
594:
1860:
1815:
1628:
1390:
550:
325:
433:
1739:
1407:
1317:
1295:
608:
1855:
1412:
1268:
1221:
696:
236:
206:
170:
70:
1918:
1845:
1835:
1690:
1478:
1360:
1235:
604:
226:
1840:
1830:
1633:
1593:
1586:
1576:
1571:
1417:
1206:
577:
138:
in Korea, as no major SSL libraries or web browsers supported the SEED algorithm, requiring users to use an
1913:
1581:
1509:
1385:
1380:
1332:
1181:
1888:
1734:
1680:
1499:
1322:
759:
20:
1850:
1774:
1402:
1285:
1211:
894:
874:
387:"Bug 934663 - Change set of cipher suites enabled by default in Gecko to match cipher suite proposal"
189:(in this case, x and x – plus some "incompatible operations"). It also has some resemblance to
91:
1613:
1365:
1342:
661:
303:
1719:
1703:
1650:
1350:
1258:
970:
899:
869:
814:
1779:
1769:
1640:
1070:
769:
729:
724:
691:
651:
599:
143:
131:
1714:
1442:
1337:
1216:
1075:
955:
924:
618:
280:
239:
software security library in
Mozilla's Gecko platform has implemented support for SEED, and
195:
1289:
1273:
1262:
1196:
1155:
1120:
1050:
1030:
904:
784:
779:
734:
491:
240:
166:
84:
461:
1789:
1709:
1670:
1618:
1603:
1427:
1375:
1186:
1171:
1110:
1105:
990:
739:
186:
411:
386:
366:
345:
1907:
1870:
1825:
1784:
1764:
1660:
1623:
1598:
1422:
1370:
1249:
1231:
1020:
995:
985:
809:
799:
646:
102:
478:
244:
offering any SEED-based cipher suites. NSS still supports SEED-based cipher suites.
1820:
1665:
1655:
1645:
1608:
1557:
1355:
1176:
1140:
1005:
884:
839:
671:
623:
573:
248:
210:
202:
119:
462:"What symmetric block cipher algorithms are supported by Bloombase Crypto Module?"
1799:
965:
960:
844:
523:
516:
509:
502:
498:
135:
127:
1759:
1729:
1724:
1685:
1397:
1115:
1055:
939:
934:
879:
749:
612:
284:
1749:
1130:
1125:
1015:
929:
824:
804:
512:: Use of the SEED Encryption Algorithm in Cryptographic Message Syntax (CMS)
367:"Bug 478839 - Firefox should support South Korean SEED crypto cipher suites"
254:
Bloombase supports SEED in their full suite of data cryptography solutions.
130:
industry, but seldom found elsewhere. It gained popularity in Korea because
529:
1794:
1754:
1468:
1432:
1226:
889:
764:
744:
656:
174:
60:
271:
Sung, Jaechul (2011). "Differential cryptanalysis of eight-round SEED".
1135:
1085:
1045:
1035:
980:
975:
819:
628:
139:
1675:
1473:
1095:
1090:
1025:
1010:
1000:
945:
919:
914:
909:
789:
774:
441:
408:"Proposal to Change the Default TLS Ciphersuites Offered by Browsers"
222:
190:
1191:
1150:
1100:
1080:
1065:
854:
834:
754:
719:
519:: Addition of SEED Cipher Suites to Transport Layer Security (TLS)
230:
182:
178:
154:
1040:
949:
864:
859:
849:
829:
701:
1530:
546:
1145:
1060:
681:
676:
198:
such that each output bit depends on 3 of the 4 input bytes.
346:"Bug 453234 - Support for SEED Cipher Suites to TLS RFC4010"
1696:
Cryptographically secure pseudorandom number generator
326:"ICT ministry seeks to drop ActiveX in private sector"
221:
SEED has been adopted by several standard protocols:
534:
501:: The SEED encryption algorithm (obsoletes RFC
1808:
1564:
1492:
1456:
1245:
1164:
710:
637:
585:
100:
90:
79:
69:
59:
54:
46:
36:
31:
526:: The SEED Cipher Algorithm and Its Use with IPsec
1542:
558:
434:"[CRYPTO] seed: New cipher algorithm"
8:
151:Ministry of Science, ICT and Future Planning
26:
1549:
1535:
1527:
565:
551:
543:
539:
535:
263:
233:(RFC 4196), and ISO/IEC 18033-3:2010.
126:(KISA). It is used broadly throughout
25:
7:
485:SEED official specification document
14:
124:Korea Information Security Agency
1884:
1883:
251:has supported SEED since 2007.
1745:Information-theoretic security
432:Chang, Hye-Shik (2007-08-21).
324:Kang Yoon-seung (2015-04-01).
273:Information Processing Letters
1:
185:, are derived from discrete
1861:Message authentication code
1816:Cryptographic hash function
1629:Cryptographic hash function
1945:
1740:Harvest now, decrypt later
481:(Official Site, in Korean)
406:Brian Smith (2013-08-08).
201:SEED has a fairly complex
18:
1879:
1856:Post-quantum cryptography
1526:
1448:Time/memory/data tradeoff
542:
538:
300:"The Cost of Monoculture"
285:10.1016/j.ipl.2011.02.004
108:
1929:Standards of South Korea
1846:Quantum key distribution
1836:Authenticated encryption
1691:Random number generation
1236:Whitening transformation
298:Gen Kanai (2007-01-26).
1924:Internet in South Korea
1841:Public-key cryptography
1831:Symmetric-key algorithm
1634:Key derivation function
1594:Cryptographic primitive
1587:Authentication protocol
1577:Outline of cryptography
1572:History of cryptography
1207:Confusion and diffusion
1582:Cryptographic protocol
146:for secure web sites.
1735:End-to-end encryption
1681:Cryptojacking malware
1500:Initialization vector
181:which, like those of
149:On April 1, 2015 the
21:Seed (disambiguation)
1851:Quantum cryptography
1775:Trusted timestamping
1279:3-subset MITM attack
895:Intel Cascade Cipher
875:Hasty Pudding cipher
530:ISO/IEC 18033-3:2010
177:. It uses two 8 Ă— 8
19:For other uses, see
1614:Cryptographic nonce
1318:Differential-linear
165:SEED is a 16-round
109:2 against 8-rounds
28:
1720:Subliminal channel
1704:Pseudorandom noise
1651:Key (cryptography)
1391:Differential-fault
609:internal mechanics
490:2013-04-30 at the
1901:
1900:
1897:
1896:
1780:Key-based routing
1770:Trapdoor function
1641:Digital signature
1522:
1521:
1518:
1517:
1505:Mode of operation
1182:Lai–Massey scheme
196:boolean functions
144:Internet Explorer
132:40-bit encryption
122:developed by the
113:
112:
1936:
1887:
1886:
1715:Insecure channel
1551:
1544:
1537:
1528:
1376:Power-monitoring
1217:Avalanche effect
925:Khufu and Khafre
578:security summary
567:
560:
553:
544:
540:
536:
466:
465:
458:
452:
451:
449:
448:
429:
423:
422:
420:
419:
410:. Archived from
403:
397:
396:
394:
393:
383:
377:
376:
374:
373:
363:
357:
356:
354:
353:
342:
336:
335:
333:
332:
321:
315:
314:
312:
311:
302:. Archived from
295:
289:
288:
268:
217:Use and adoption
29:
1944:
1943:
1939:
1938:
1937:
1935:
1934:
1933:
1919:Feistel ciphers
1904:
1903:
1902:
1893:
1875:
1804:
1560:
1555:
1514:
1488:
1457:Standardization
1452:
1381:Electromagnetic
1333:Integral/Square
1290:Piling-up lemma
1274:Biclique attack
1263:EFF DES cracker
1247:
1241:
1172:Feistel network
1160:
785:CIPHERUNICORN-E
780:CIPHERUNICORN-A
712:
706:
639:
633:
587:
581:
571:
492:Wayback Machine
475:
470:
469:
460:
459:
455:
446:
444:
431:
430:
426:
417:
415:
405:
404:
400:
391:
389:
385:
384:
380:
371:
369:
365:
364:
360:
351:
349:
344:
343:
339:
330:
328:
323:
322:
318:
309:
307:
297:
296:
292:
279:(10): 474–478.
270:
269:
265:
260:
241:Mozilla Firefox
219:
167:Feistel network
163:
85:Feistel network
47:First published
24:
17:
12:
11:
5:
1942:
1940:
1932:
1931:
1926:
1921:
1916:
1906:
1905:
1899:
1898:
1895:
1894:
1892:
1891:
1880:
1877:
1876:
1874:
1873:
1868:
1866:Random numbers
1863:
1858:
1853:
1848:
1843:
1838:
1833:
1828:
1823:
1818:
1812:
1810:
1806:
1805:
1803:
1802:
1797:
1792:
1790:Garlic routing
1787:
1782:
1777:
1772:
1767:
1762:
1757:
1752:
1747:
1742:
1737:
1732:
1727:
1722:
1717:
1712:
1710:Secure channel
1707:
1701:
1700:
1699:
1688:
1683:
1678:
1673:
1671:Key stretching
1668:
1663:
1658:
1653:
1648:
1643:
1638:
1637:
1636:
1631:
1621:
1619:Cryptovirology
1616:
1611:
1606:
1604:Cryptocurrency
1601:
1596:
1591:
1590:
1589:
1579:
1574:
1568:
1566:
1562:
1561:
1556:
1554:
1553:
1546:
1539:
1531:
1524:
1523:
1520:
1519:
1516:
1515:
1513:
1512:
1507:
1502:
1496:
1494:
1490:
1489:
1487:
1486:
1481:
1476:
1471:
1466:
1460:
1458:
1454:
1453:
1451:
1450:
1445:
1440:
1435:
1430:
1425:
1420:
1415:
1410:
1405:
1400:
1395:
1394:
1393:
1388:
1383:
1378:
1373:
1363:
1358:
1353:
1348:
1340:
1335:
1330:
1323:Distinguishing
1320:
1315:
1314:
1313:
1308:
1303:
1293:
1283:
1282:
1281:
1276:
1266:
1255:
1253:
1243:
1242:
1240:
1239:
1229:
1224:
1219:
1214:
1209:
1204:
1199:
1194:
1189:
1187:Product cipher
1184:
1179:
1174:
1168:
1166:
1162:
1161:
1159:
1158:
1153:
1148:
1143:
1138:
1133:
1128:
1123:
1118:
1113:
1108:
1103:
1098:
1093:
1088:
1083:
1078:
1073:
1068:
1063:
1058:
1053:
1048:
1043:
1038:
1033:
1028:
1023:
1018:
1013:
1008:
1003:
998:
993:
988:
983:
978:
973:
968:
963:
958:
953:
942:
937:
932:
927:
922:
917:
912:
907:
902:
897:
892:
887:
882:
877:
872:
867:
862:
857:
852:
847:
842:
837:
832:
827:
822:
817:
815:Cryptomeria/C2
812:
807:
802:
797:
792:
787:
782:
777:
772:
767:
762:
757:
752:
747:
742:
737:
732:
727:
722:
716:
714:
708:
707:
705:
704:
699:
694:
689:
684:
679:
674:
669:
664:
659:
654:
649:
643:
641:
635:
634:
632:
631:
626:
621:
616:
602:
597:
591:
589:
583:
582:
572:
570:
569:
562:
555:
547:
533:
532:
527:
520:
513:
506:
495:
482:
474:
473:External links
471:
468:
467:
453:
424:
398:
378:
358:
337:
316:
290:
262:
261:
259:
256:
218:
215:
187:exponentiation
171:128-bit blocks
162:
159:
111:
110:
106:
105:
98:
97:
94:
88:
87:
81:
77:
76:
73:
67:
66:
63:
57:
56:
52:
51:
48:
44:
43:
38:
34:
33:
15:
13:
10:
9:
6:
4:
3:
2:
1941:
1930:
1927:
1925:
1922:
1920:
1917:
1915:
1914:Block ciphers
1912:
1911:
1909:
1890:
1882:
1881:
1878:
1872:
1871:Steganography
1869:
1867:
1864:
1862:
1859:
1857:
1854:
1852:
1849:
1847:
1844:
1842:
1839:
1837:
1834:
1832:
1829:
1827:
1826:Stream cipher
1824:
1822:
1819:
1817:
1814:
1813:
1811:
1807:
1801:
1798:
1796:
1793:
1791:
1788:
1786:
1785:Onion routing
1783:
1781:
1778:
1776:
1773:
1771:
1768:
1766:
1765:Shared secret
1763:
1761:
1758:
1756:
1753:
1751:
1748:
1746:
1743:
1741:
1738:
1736:
1733:
1731:
1728:
1726:
1723:
1721:
1718:
1716:
1713:
1711:
1708:
1705:
1702:
1697:
1694:
1693:
1692:
1689:
1687:
1684:
1682:
1679:
1677:
1674:
1672:
1669:
1667:
1664:
1662:
1661:Key generator
1659:
1657:
1654:
1652:
1649:
1647:
1644:
1642:
1639:
1635:
1632:
1630:
1627:
1626:
1625:
1624:Hash function
1622:
1620:
1617:
1615:
1612:
1610:
1607:
1605:
1602:
1600:
1599:Cryptanalysis
1597:
1595:
1592:
1588:
1585:
1584:
1583:
1580:
1578:
1575:
1573:
1570:
1569:
1567:
1563:
1559:
1552:
1547:
1545:
1540:
1538:
1533:
1532:
1529:
1525:
1511:
1508:
1506:
1503:
1501:
1498:
1497:
1495:
1491:
1485:
1482:
1480:
1477:
1475:
1472:
1470:
1467:
1465:
1462:
1461:
1459:
1455:
1449:
1446:
1444:
1441:
1439:
1436:
1434:
1431:
1429:
1426:
1424:
1421:
1419:
1416:
1414:
1411:
1409:
1406:
1404:
1403:Interpolation
1401:
1399:
1396:
1392:
1389:
1387:
1384:
1382:
1379:
1377:
1374:
1372:
1369:
1368:
1367:
1364:
1362:
1359:
1357:
1354:
1352:
1349:
1347:
1346:
1341:
1339:
1336:
1334:
1331:
1328:
1324:
1321:
1319:
1316:
1312:
1309:
1307:
1304:
1302:
1299:
1298:
1297:
1294:
1291:
1287:
1284:
1280:
1277:
1275:
1272:
1271:
1270:
1267:
1264:
1260:
1257:
1256:
1254:
1251:
1250:cryptanalysis
1244:
1237:
1233:
1232:Key whitening
1230:
1228:
1225:
1223:
1220:
1218:
1215:
1213:
1210:
1208:
1205:
1203:
1200:
1198:
1195:
1193:
1190:
1188:
1185:
1183:
1180:
1178:
1175:
1173:
1170:
1169:
1167:
1163:
1157:
1154:
1152:
1149:
1147:
1144:
1142:
1139:
1137:
1134:
1132:
1129:
1127:
1124:
1122:
1119:
1117:
1114:
1112:
1109:
1107:
1104:
1102:
1099:
1097:
1094:
1092:
1089:
1087:
1084:
1082:
1079:
1077:
1074:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1047:
1044:
1042:
1039:
1037:
1034:
1032:
1029:
1027:
1024:
1022:
1021:New Data Seal
1019:
1017:
1014:
1012:
1009:
1007:
1004:
1002:
999:
997:
994:
992:
989:
987:
984:
982:
979:
977:
974:
972:
969:
967:
964:
962:
959:
957:
954:
951:
947:
943:
941:
938:
936:
933:
931:
928:
926:
923:
921:
918:
916:
913:
911:
908:
906:
903:
901:
898:
896:
893:
891:
888:
886:
883:
881:
878:
876:
873:
871:
868:
866:
863:
861:
858:
856:
853:
851:
848:
846:
843:
841:
838:
836:
833:
831:
828:
826:
823:
821:
818:
816:
813:
811:
808:
806:
803:
801:
798:
796:
793:
791:
788:
786:
783:
781:
778:
776:
773:
771:
768:
766:
763:
761:
760:BEAR and LION
758:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
731:
728:
726:
723:
721:
718:
717:
715:
709:
703:
700:
698:
695:
693:
690:
688:
685:
683:
680:
678:
675:
673:
670:
668:
665:
663:
660:
658:
655:
653:
650:
648:
645:
644:
642:
636:
630:
627:
625:
622:
620:
617:
614:
610:
606:
603:
601:
598:
596:
593:
592:
590:
584:
579:
575:
574:Block ciphers
568:
563:
561:
556:
554:
549:
548:
545:
541:
537:
531:
528:
525:
521:
518:
514:
511:
507:
504:
500:
496:
493:
489:
486:
483:
480:
477:
476:
472:
463:
457:
454:
443:
439:
435:
428:
425:
414:on 2013-12-03
413:
409:
402:
399:
388:
382:
379:
368:
362:
359:
347:
341:
338:
327:
320:
317:
306:on 2007-02-02
305:
301:
294:
291:
286:
282:
278:
274:
267:
264:
257:
255:
252:
250:
245:
242:
238:
234:
232:
228:
224:
216:
214:
212:
208:
204:
199:
197:
192:
188:
184:
180:
176:
172:
168:
160:
158:
156:
152:
147:
145:
141:
137:
133:
129:
125:
121:
117:
107:
104:
103:cryptanalysis
99:
95:
93:
89:
86:
82:
78:
74:
72:
68:
64:
62:
58:
55:Cipher detail
53:
49:
45:
42:
39:
35:
30:
22:
1821:Block cipher
1666:Key schedule
1656:Key exchange
1646:Kleptography
1609:Cryptosystem
1558:Cryptography
1408:Partitioning
1366:Side-channel
1344:
1311:Higher-order
1296:Differential
1177:Key schedule
686:
456:
445:. Retrieved
438:Linux kernel
437:
427:
416:. Retrieved
412:the original
401:
390:. Retrieved
381:
370:. Retrieved
361:
350:. Retrieved
340:
329:. Retrieved
319:
308:. Retrieved
304:the original
293:
276:
272:
266:
253:
249:Linux kernel
246:
235:
229:(RFC 4162),
225:(RFC 4010),
220:
211:Golden ratio
203:key schedule
200:
164:
148:
136:web browsers
128:South Korean
120:block cipher
115:
114:
101:Best public
16:Block cipher
1809:Mathematics
1800:Mix network
1493:Utilization
1479:NSA Suite B
1464:AES process
1413:Rubber-hose
1351:Related-key
1259:Brute-force
638:Less common
479:SEED - KISA
209:) from the
175:128-bit key
142:control in
71:Block sizes
1908:Categories
1760:Ciphertext
1730:Decryption
1725:Encryption
1686:Ransomware
1443:Chi-square
1361:Rotational
1301:Impossible
1222:Block size
1116:Spectr-H64
940:Ladder-DES
935:Kuznyechik
880:Hierocrypt
750:BassOmatic
713:algorithms
640:algorithms
613:Triple DES
588:algorithms
447:2020-03-11
418:2013-11-30
392:2013-11-30
372:2009-08-09
352:2013-12-01
331:2015-08-01
310:2007-01-29
258:References
1750:Plaintext
1418:Black-bag
1338:Boomerang
1327:Known-key
1306:Truncated
1131:Threefish
1126:SXAL/MBAL
1016:MultiSwap
971:MacGuffin
930:KN-Cipher
870:Grand Cru
825:CS-Cipher
805:COCONUT98
522:RFC
515:RFC
508:RFC
497:RFC
494:(English)
348:. Mozilla
80:Structure
61:Key sizes
37:Designers
1889:Category
1795:Kademlia
1755:Codetext
1698:(CSPRNG)
1469:CRYPTREC
1433:Weak key
1386:Acoustic
1227:Key size
1071:Red Pike
890:IDEA NXT
770:Chiasmus
765:CAST-256
745:BaseKing
730:Akelarre
725:Adiantum
692:Skipjack
657:CAST-128
652:Camellia
600:Blowfish
488:Archived
75:128 bits
65:128 bits
1565:General
1510:Padding
1428:Rebound
1136:Treyfer
1086:SAVILLE
1046:PRESENT
1036:NOEKEON
981:MAGENTA
976:Madryga
956:Lucifer
820:CRYPTON
629:Twofish
619:Serpent
227:TLS/SSL
179:S-boxes
140:ActiveX
83:Nested
32:General
1676:Keygen
1474:NESSIE
1423:Davies
1371:Timing
1286:Linear
1246:Attack
1165:Design
1156:Zodiac
1121:Square
1096:SHACAL
1091:SC2000
1051:Prince
1031:Nimbus
1026:NewDES
1011:MULTI2
1001:MISTY1
944:LOKI (
920:KHAZAD
915:KeeLoq
910:KASUMI
905:Kalyna
790:CLEFIA
775:CIKS-1
735:Anubis
586:Common
442:GitHub
223:S/MIME
191:MISTY1
173:and a
161:Design
92:Rounds
1706:(PRN)
1356:Slide
1212:Round
1197:P-box
1192:S-box
1151:XXTEA
1111:Speck
1106:Simon
1101:SHARK
1081:SAFER
1066:REDOC
991:Mercy
950:89/91
900:Iraqi
865:G-DES
855:FEA-M
835:DES-X
800:Cobra
755:BATON
740:Ascon
720:3-Way
711:Other
231:IPSec
183:SAFER
169:with
155:HTML5
118:is a
1484:CNSA
1343:Mod
1269:MITM
1041:NUSH
996:MESH
986:MARS
860:FROG
850:FEAL
830:DEAL
810:Crab
795:CMEA
702:XTEA
687:SEED
667:IDEA
662:GOST
647:ARIA
524:4196
517:4162
510:4010
503:4009
499:4269
247:The
116:SEED
50:1998
41:KISA
27:SEED
1438:Tau
1398:XSL
1202:SPN
1146:xmx
1141:UES
1076:S-1
1061:RC2
1006:MMB
885:ICE
840:DFC
697:TEA
682:RC6
677:RC5
672:LEA
624:SM4
605:DES
595:AES
281:doi
277:111
237:NSS
207:TEA
1910::
966:M8
961:M6
948:,
946:97
845:E2
611:,
440:.
436:.
275:.
213:.
96:16
1550:e
1543:t
1536:v
1345:n
1329:)
1325:(
1292:)
1288:(
1265:)
1261:(
1252:)
1248:(
1238:)
1234:(
1056:Q
952:)
615:)
607:(
580:)
576:(
566:e
559:t
552:v
505:)
464:.
450:.
421:.
395:.
375:.
355:.
334:.
313:.
287:.
283::
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.