Knowledge (XXG)

SEED

Source đź“ť

1885: 193:
in the recursiveness of its structure: the 128-bit full cipher is a Feistel network with an F-function operating on 64-bit halves, while the F-function itself is a Feistel network composed of a G-function operating on 32-bit halves. However the recursion does not extend further because the G-function
243:
as of 3.5.4 supports SEED as a TLS cipher; however, Mozilla decided to drop the support of SEED by default in Firefox 27 and above because support for SEED has not had any practical positive effect in terms of helping South Korea migrate away from ActiveX-based e-commerce, and other browsers are not
157:-based technologies will be employed as they operate on many platforms, including mobile devices. Starting with the private sector, the ministry plans to expand this further to ultimately remove this dependency from public websites as well. 194:
is not a Feistel network. In the G-function, the 32-bit word is considered as four 8-bit bytes, each of which is passed through one or the other of the S-boxes, then combined in a moderately complex set of
1865: 1695: 487: 134:
was not considered strong enough, so the Korea Information Security Agency developed its own standard. However, this decision has historically limited the competition of
205:, generating its thirty-two 32-bit subkeys through application of its G-function on a series of rotations of the raw key, combined with round constants derived (as in 1548: 1483: 564: 150: 1310: 666: 1300: 794: 299: 1201: 1463: 1437: 1305: 153:(MSIP) announced its plan to remove the ActiveX dependency from at least 90 percent of the country's top 100 websites by 2017. Instead, 123: 40: 484: 1278: 1928: 1541: 1923: 1447: 557: 407: 1326: 1744: 1504: 1534: 594: 1860: 1815: 1628: 1390: 550: 325: 433: 1739: 1407: 1317: 1295: 608: 1855: 1412: 1268: 1221: 696: 236: 206: 170: 70: 1918: 1845: 1835: 1690: 1478: 1360: 1235: 604: 226: 1840: 1830: 1633: 1593: 1586: 1576: 1571: 1417: 1206: 577: 138:
in Korea, as no major SSL libraries or web browsers supported the SEED algorithm, requiring users to use an
1913: 1581: 1509: 1385: 1380: 1332: 1181: 1888: 1734: 1680: 1499: 1322: 759: 20: 1850: 1774: 1402: 1285: 1211: 894: 874: 387:"Bug 934663 - Change set of cipher suites enabled by default in Gecko to match cipher suite proposal" 189:(in this case, x and x – plus some "incompatible operations"). It also has some resemblance to 91: 1613: 1365: 1342: 661: 303: 1719: 1703: 1650: 1350: 1258: 970: 899: 869: 814: 1779: 1769: 1640: 1070: 769: 729: 724: 691: 651: 599: 143: 131: 1714: 1442: 1337: 1216: 1075: 955: 924: 618: 280: 239:
software security library in Mozilla's Gecko platform has implemented support for SEED, and
195: 1289: 1273: 1262: 1196: 1155: 1120: 1050: 1030: 904: 784: 779: 734: 491: 240: 166: 84: 461: 1789: 1709: 1670: 1618: 1603: 1427: 1375: 1186: 1171: 1110: 1105: 990: 739: 186: 411: 386: 366: 345: 1907: 1870: 1825: 1784: 1764: 1660: 1623: 1598: 1422: 1370: 1249: 1231: 1020: 995: 985: 809: 799: 646: 102: 478: 244:
offering any SEED-based cipher suites. NSS still supports SEED-based cipher suites.
1820: 1665: 1655: 1645: 1608: 1557: 1355: 1176: 1140: 1005: 884: 839: 671: 623: 573: 248: 210: 202: 119: 462:"What symmetric block cipher algorithms are supported by Bloombase Crypto Module?" 1799: 965: 960: 844: 523: 516: 509: 502: 498: 135: 127: 1759: 1729: 1724: 1685: 1397: 1115: 1055: 939: 934: 879: 749: 612: 284: 1749: 1130: 1125: 1015: 929: 824: 804: 512:: Use of the SEED Encryption Algorithm in Cryptographic Message Syntax (CMS) 367:"Bug 478839 - Firefox should support South Korean SEED crypto cipher suites" 254:
Bloombase supports SEED in their full suite of data cryptography solutions.
130:
industry, but seldom found elsewhere. It gained popularity in Korea because
529: 1794: 1754: 1468: 1432: 1226: 889: 764: 744: 656: 174: 60: 271:
Sung, Jaechul (2011). "Differential cryptanalysis of eight-round SEED".
1135: 1085: 1045: 1035: 980: 975: 819: 628: 139: 1675: 1473: 1095: 1090: 1025: 1010: 1000: 945: 919: 914: 909: 789: 774: 441: 408:"Proposal to Change the Default TLS Ciphersuites Offered by Browsers" 222: 190: 1191: 1150: 1100: 1080: 1065: 854: 834: 754: 719: 519:: Addition of SEED Cipher Suites to Transport Layer Security (TLS) 230: 182: 178: 154: 1040: 949: 864: 859: 849: 829: 701: 1530: 546: 1145: 1060: 681: 676: 198:
such that each output bit depends on 3 of the 4 input bytes.
346:"Bug 453234 - Support for SEED Cipher Suites to TLS RFC4010" 1696:
Cryptographically secure pseudorandom number generator
326:"ICT ministry seeks to drop ActiveX in private sector" 221:
SEED has been adopted by several standard protocols:
534: 501:: The SEED encryption algorithm (obsoletes RFC  1808: 1564: 1492: 1456: 1245: 1164: 710: 637: 585: 100: 90: 79: 69: 59: 54: 46: 36: 31: 526:: The SEED Cipher Algorithm and Its Use with IPsec 1542: 558: 434:"[CRYPTO] seed: New cipher algorithm" 8: 151:Ministry of Science, ICT and Future Planning 26: 1549: 1535: 1527: 565: 551: 543: 539: 535: 263: 233:(RFC 4196), and ISO/IEC 18033-3:2010. 126:(KISA). It is used broadly throughout 25: 7: 485:SEED official specification document 14: 124:Korea Information Security Agency 1884: 1883: 251:has supported SEED since 2007. 1745:Information-theoretic security 432:Chang, Hye-Shik (2007-08-21). 324:Kang Yoon-seung (2015-04-01). 273:Information Processing Letters 1: 185:, are derived from discrete 1861:Message authentication code 1816:Cryptographic hash function 1629:Cryptographic hash function 1945: 1740:Harvest now, decrypt later 481:(Official Site, in Korean) 406:Brian Smith (2013-08-08). 201:SEED has a fairly complex 18: 1879: 1856:Post-quantum cryptography 1526: 1448:Time/memory/data tradeoff 542: 538: 300:"The Cost of Monoculture" 285:10.1016/j.ipl.2011.02.004 108: 1929:Standards of South Korea 1846:Quantum key distribution 1836:Authenticated encryption 1691:Random number generation 1236:Whitening transformation 298:Gen Kanai (2007-01-26). 1924:Internet in South Korea 1841:Public-key cryptography 1831:Symmetric-key algorithm 1634:Key derivation function 1594:Cryptographic primitive 1587:Authentication protocol 1577:Outline of cryptography 1572:History of cryptography 1207:Confusion and diffusion 1582:Cryptographic protocol 146:for secure web sites. 1735:End-to-end encryption 1681:Cryptojacking malware 1500:Initialization vector 181:which, like those of 149:On April 1, 2015 the 21:Seed (disambiguation) 1851:Quantum cryptography 1775:Trusted timestamping 1279:3-subset MITM attack 895:Intel Cascade Cipher 875:Hasty Pudding cipher 530:ISO/IEC 18033-3:2010 177:. It uses two 8 Ă— 8 19:For other uses, see 1614:Cryptographic nonce 1318:Differential-linear 165:SEED is a 16-round 109:2 against 8-rounds 28: 1720:Subliminal channel 1704:Pseudorandom noise 1651:Key (cryptography) 1391:Differential-fault 609:internal mechanics 490:2013-04-30 at the 1901: 1900: 1897: 1896: 1780:Key-based routing 1770:Trapdoor function 1641:Digital signature 1522: 1521: 1518: 1517: 1505:Mode of operation 1182:Lai–Massey scheme 196:boolean functions 144:Internet Explorer 132:40-bit encryption 122:developed by the 113: 112: 1936: 1887: 1886: 1715:Insecure channel 1551: 1544: 1537: 1528: 1376:Power-monitoring 1217:Avalanche effect 925:Khufu and Khafre 578:security summary 567: 560: 553: 544: 540: 536: 466: 465: 458: 452: 451: 449: 448: 429: 423: 422: 420: 419: 410:. Archived from 403: 397: 396: 394: 393: 383: 377: 376: 374: 373: 363: 357: 356: 354: 353: 342: 336: 335: 333: 332: 321: 315: 314: 312: 311: 302:. Archived from 295: 289: 288: 268: 217:Use and adoption 29: 1944: 1943: 1939: 1938: 1937: 1935: 1934: 1933: 1919:Feistel ciphers 1904: 1903: 1902: 1893: 1875: 1804: 1560: 1555: 1514: 1488: 1457:Standardization 1452: 1381:Electromagnetic 1333:Integral/Square 1290:Piling-up lemma 1274:Biclique attack 1263:EFF DES cracker 1247: 1241: 1172:Feistel network 1160: 785:CIPHERUNICORN-E 780:CIPHERUNICORN-A 712: 706: 639: 633: 587: 581: 571: 492:Wayback Machine 475: 470: 469: 460: 459: 455: 446: 444: 431: 430: 426: 417: 415: 405: 404: 400: 391: 389: 385: 384: 380: 371: 369: 365: 364: 360: 351: 349: 344: 343: 339: 330: 328: 323: 322: 318: 309: 307: 297: 296: 292: 279:(10): 474–478. 270: 269: 265: 260: 241:Mozilla Firefox 219: 167:Feistel network 163: 85:Feistel network 47:First published 24: 17: 12: 11: 5: 1942: 1940: 1932: 1931: 1926: 1921: 1916: 1906: 1905: 1899: 1898: 1895: 1894: 1892: 1891: 1880: 1877: 1876: 1874: 1873: 1868: 1866:Random numbers 1863: 1858: 1853: 1848: 1843: 1838: 1833: 1828: 1823: 1818: 1812: 1810: 1806: 1805: 1803: 1802: 1797: 1792: 1790:Garlic routing 1787: 1782: 1777: 1772: 1767: 1762: 1757: 1752: 1747: 1742: 1737: 1732: 1727: 1722: 1717: 1712: 1710:Secure channel 1707: 1701: 1700: 1699: 1688: 1683: 1678: 1673: 1671:Key stretching 1668: 1663: 1658: 1653: 1648: 1643: 1638: 1637: 1636: 1631: 1621: 1619:Cryptovirology 1616: 1611: 1606: 1604:Cryptocurrency 1601: 1596: 1591: 1590: 1589: 1579: 1574: 1568: 1566: 1562: 1561: 1556: 1554: 1553: 1546: 1539: 1531: 1524: 1523: 1520: 1519: 1516: 1515: 1513: 1512: 1507: 1502: 1496: 1494: 1490: 1489: 1487: 1486: 1481: 1476: 1471: 1466: 1460: 1458: 1454: 1453: 1451: 1450: 1445: 1440: 1435: 1430: 1425: 1420: 1415: 1410: 1405: 1400: 1395: 1394: 1393: 1388: 1383: 1378: 1373: 1363: 1358: 1353: 1348: 1340: 1335: 1330: 1323:Distinguishing 1320: 1315: 1314: 1313: 1308: 1303: 1293: 1283: 1282: 1281: 1276: 1266: 1255: 1253: 1243: 1242: 1240: 1239: 1229: 1224: 1219: 1214: 1209: 1204: 1199: 1194: 1189: 1187:Product cipher 1184: 1179: 1174: 1168: 1166: 1162: 1161: 1159: 1158: 1153: 1148: 1143: 1138: 1133: 1128: 1123: 1118: 1113: 1108: 1103: 1098: 1093: 1088: 1083: 1078: 1073: 1068: 1063: 1058: 1053: 1048: 1043: 1038: 1033: 1028: 1023: 1018: 1013: 1008: 1003: 998: 993: 988: 983: 978: 973: 968: 963: 958: 953: 942: 937: 932: 927: 922: 917: 912: 907: 902: 897: 892: 887: 882: 877: 872: 867: 862: 857: 852: 847: 842: 837: 832: 827: 822: 817: 815:Cryptomeria/C2 812: 807: 802: 797: 792: 787: 782: 777: 772: 767: 762: 757: 752: 747: 742: 737: 732: 727: 722: 716: 714: 708: 707: 705: 704: 699: 694: 689: 684: 679: 674: 669: 664: 659: 654: 649: 643: 641: 635: 634: 632: 631: 626: 621: 616: 602: 597: 591: 589: 583: 582: 572: 570: 569: 562: 555: 547: 533: 532: 527: 520: 513: 506: 495: 482: 474: 473:External links 471: 468: 467: 453: 424: 398: 378: 358: 337: 316: 290: 262: 261: 259: 256: 218: 215: 187:exponentiation 171:128-bit blocks 162: 159: 111: 110: 106: 105: 98: 97: 94: 88: 87: 81: 77: 76: 73: 67: 66: 63: 57: 56: 52: 51: 48: 44: 43: 38: 34: 33: 15: 13: 10: 9: 6: 4: 3: 2: 1941: 1930: 1927: 1925: 1922: 1920: 1917: 1915: 1914:Block ciphers 1912: 1911: 1909: 1890: 1882: 1881: 1878: 1872: 1871:Steganography 1869: 1867: 1864: 1862: 1859: 1857: 1854: 1852: 1849: 1847: 1844: 1842: 1839: 1837: 1834: 1832: 1829: 1827: 1826:Stream cipher 1824: 1822: 1819: 1817: 1814: 1813: 1811: 1807: 1801: 1798: 1796: 1793: 1791: 1788: 1786: 1785:Onion routing 1783: 1781: 1778: 1776: 1773: 1771: 1768: 1766: 1765:Shared secret 1763: 1761: 1758: 1756: 1753: 1751: 1748: 1746: 1743: 1741: 1738: 1736: 1733: 1731: 1728: 1726: 1723: 1721: 1718: 1716: 1713: 1711: 1708: 1705: 1702: 1697: 1694: 1693: 1692: 1689: 1687: 1684: 1682: 1679: 1677: 1674: 1672: 1669: 1667: 1664: 1662: 1661:Key generator 1659: 1657: 1654: 1652: 1649: 1647: 1644: 1642: 1639: 1635: 1632: 1630: 1627: 1626: 1625: 1624:Hash function 1622: 1620: 1617: 1615: 1612: 1610: 1607: 1605: 1602: 1600: 1599:Cryptanalysis 1597: 1595: 1592: 1588: 1585: 1584: 1583: 1580: 1578: 1575: 1573: 1570: 1569: 1567: 1563: 1559: 1552: 1547: 1545: 1540: 1538: 1533: 1532: 1529: 1525: 1511: 1508: 1506: 1503: 1501: 1498: 1497: 1495: 1491: 1485: 1482: 1480: 1477: 1475: 1472: 1470: 1467: 1465: 1462: 1461: 1459: 1455: 1449: 1446: 1444: 1441: 1439: 1436: 1434: 1431: 1429: 1426: 1424: 1421: 1419: 1416: 1414: 1411: 1409: 1406: 1404: 1403:Interpolation 1401: 1399: 1396: 1392: 1389: 1387: 1384: 1382: 1379: 1377: 1374: 1372: 1369: 1368: 1367: 1364: 1362: 1359: 1357: 1354: 1352: 1349: 1347: 1346: 1341: 1339: 1336: 1334: 1331: 1328: 1324: 1321: 1319: 1316: 1312: 1309: 1307: 1304: 1302: 1299: 1298: 1297: 1294: 1291: 1287: 1284: 1280: 1277: 1275: 1272: 1271: 1270: 1267: 1264: 1260: 1257: 1256: 1254: 1251: 1250:cryptanalysis 1244: 1237: 1233: 1232:Key whitening 1230: 1228: 1225: 1223: 1220: 1218: 1215: 1213: 1210: 1208: 1205: 1203: 1200: 1198: 1195: 1193: 1190: 1188: 1185: 1183: 1180: 1178: 1175: 1173: 1170: 1169: 1167: 1163: 1157: 1154: 1152: 1149: 1147: 1144: 1142: 1139: 1137: 1134: 1132: 1129: 1127: 1124: 1122: 1119: 1117: 1114: 1112: 1109: 1107: 1104: 1102: 1099: 1097: 1094: 1092: 1089: 1087: 1084: 1082: 1079: 1077: 1074: 1072: 1069: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1047: 1044: 1042: 1039: 1037: 1034: 1032: 1029: 1027: 1024: 1022: 1021:New Data Seal 1019: 1017: 1014: 1012: 1009: 1007: 1004: 1002: 999: 997: 994: 992: 989: 987: 984: 982: 979: 977: 974: 972: 969: 967: 964: 962: 959: 957: 954: 951: 947: 943: 941: 938: 936: 933: 931: 928: 926: 923: 921: 918: 916: 913: 911: 908: 906: 903: 901: 898: 896: 893: 891: 888: 886: 883: 881: 878: 876: 873: 871: 868: 866: 863: 861: 858: 856: 853: 851: 848: 846: 843: 841: 838: 836: 833: 831: 828: 826: 823: 821: 818: 816: 813: 811: 808: 806: 803: 801: 798: 796: 793: 791: 788: 786: 783: 781: 778: 776: 773: 771: 768: 766: 763: 761: 760:BEAR and LION 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 731: 728: 726: 723: 721: 718: 717: 715: 709: 703: 700: 698: 695: 693: 690: 688: 685: 683: 680: 678: 675: 673: 670: 668: 665: 663: 660: 658: 655: 653: 650: 648: 645: 644: 642: 636: 630: 627: 625: 622: 620: 617: 614: 610: 606: 603: 601: 598: 596: 593: 592: 590: 584: 579: 575: 574:Block ciphers 568: 563: 561: 556: 554: 549: 548: 545: 541: 537: 531: 528: 525: 521: 518: 514: 511: 507: 504: 500: 496: 493: 489: 486: 483: 480: 477: 476: 472: 463: 457: 454: 443: 439: 435: 428: 425: 414:on 2013-12-03 413: 409: 402: 399: 388: 382: 379: 368: 362: 359: 347: 341: 338: 327: 320: 317: 306:on 2007-02-02 305: 301: 294: 291: 286: 282: 278: 274: 267: 264: 257: 255: 252: 250: 245: 242: 238: 234: 232: 228: 224: 216: 214: 212: 208: 204: 199: 197: 192: 188: 184: 180: 176: 172: 168: 160: 158: 156: 152: 147: 145: 141: 137: 133: 129: 125: 121: 117: 107: 104: 103:cryptanalysis 99: 95: 93: 89: 86: 82: 78: 74: 72: 68: 64: 62: 58: 55:Cipher detail 53: 49: 45: 42: 39: 35: 30: 22: 1821:Block cipher 1666:Key schedule 1656:Key exchange 1646:Kleptography 1609:Cryptosystem 1558:Cryptography 1408:Partitioning 1366:Side-channel 1344: 1311:Higher-order 1296:Differential 1177:Key schedule 686: 456: 445:. Retrieved 438:Linux kernel 437: 427: 416:. Retrieved 412:the original 401: 390:. Retrieved 381: 370:. Retrieved 361: 350:. Retrieved 340: 329:. Retrieved 319: 308:. Retrieved 304:the original 293: 276: 272: 266: 253: 249:Linux kernel 246: 235: 229:(RFC 4162), 225:(RFC 4010), 220: 211:Golden ratio 203:key schedule 200: 164: 148: 136:web browsers 128:South Korean 120:block cipher 115: 114: 101:Best public 16:Block cipher 1809:Mathematics 1800:Mix network 1493:Utilization 1479:NSA Suite B 1464:AES process 1413:Rubber-hose 1351:Related-key 1259:Brute-force 638:Less common 479:SEED - KISA 209:) from the 175:128-bit key 142:control in 71:Block sizes 1908:Categories 1760:Ciphertext 1730:Decryption 1725:Encryption 1686:Ransomware 1443:Chi-square 1361:Rotational 1301:Impossible 1222:Block size 1116:Spectr-H64 940:Ladder-DES 935:Kuznyechik 880:Hierocrypt 750:BassOmatic 713:algorithms 640:algorithms 613:Triple DES 588:algorithms 447:2020-03-11 418:2013-11-30 392:2013-11-30 372:2009-08-09 352:2013-12-01 331:2015-08-01 310:2007-01-29 258:References 1750:Plaintext 1418:Black-bag 1338:Boomerang 1327:Known-key 1306:Truncated 1131:Threefish 1126:SXAL/MBAL 1016:MultiSwap 971:MacGuffin 930:KN-Cipher 870:Grand Cru 825:CS-Cipher 805:COCONUT98 522:RFC  515:RFC  508:RFC  497:RFC  494:(English) 348:. Mozilla 80:Structure 61:Key sizes 37:Designers 1889:Category 1795:Kademlia 1755:Codetext 1698:(CSPRNG) 1469:CRYPTREC 1433:Weak key 1386:Acoustic 1227:Key size 1071:Red Pike 890:IDEA NXT 770:Chiasmus 765:CAST-256 745:BaseKing 730:Akelarre 725:Adiantum 692:Skipjack 657:CAST-128 652:Camellia 600:Blowfish 488:Archived 75:128 bits 65:128 bits 1565:General 1510:Padding 1428:Rebound 1136:Treyfer 1086:SAVILLE 1046:PRESENT 1036:NOEKEON 981:MAGENTA 976:Madryga 956:Lucifer 820:CRYPTON 629:Twofish 619:Serpent 227:TLS/SSL 179:S-boxes 140:ActiveX 83:Nested 32:General 1676:Keygen 1474:NESSIE 1423:Davies 1371:Timing 1286:Linear 1246:Attack 1165:Design 1156:Zodiac 1121:Square 1096:SHACAL 1091:SC2000 1051:Prince 1031:Nimbus 1026:NewDES 1011:MULTI2 1001:MISTY1 944:LOKI ( 920:KHAZAD 915:KeeLoq 910:KASUMI 905:Kalyna 790:CLEFIA 775:CIKS-1 735:Anubis 586:Common 442:GitHub 223:S/MIME 191:MISTY1 173:and a 161:Design 92:Rounds 1706:(PRN) 1356:Slide 1212:Round 1197:P-box 1192:S-box 1151:XXTEA 1111:Speck 1106:Simon 1101:SHARK 1081:SAFER 1066:REDOC 991:Mercy 950:89/91 900:Iraqi 865:G-DES 855:FEA-M 835:DES-X 800:Cobra 755:BATON 740:Ascon 720:3-Way 711:Other 231:IPSec 183:SAFER 169:with 155:HTML5 118:is a 1484:CNSA 1343:Mod 1269:MITM 1041:NUSH 996:MESH 986:MARS 860:FROG 850:FEAL 830:DEAL 810:Crab 795:CMEA 702:XTEA 687:SEED 667:IDEA 662:GOST 647:ARIA 524:4196 517:4162 510:4010 503:4009 499:4269 247:The 116:SEED 50:1998 41:KISA 27:SEED 1438:Tau 1398:XSL 1202:SPN 1146:xmx 1141:UES 1076:S-1 1061:RC2 1006:MMB 885:ICE 840:DFC 697:TEA 682:RC6 677:RC5 672:LEA 624:SM4 605:DES 595:AES 281:doi 277:111 237:NSS 207:TEA 1910:: 966:M8 961:M6 948:, 946:97 845:E2 611:, 440:. 436:. 275:. 213:. 96:16 1550:e 1543:t 1536:v 1345:n 1329:) 1325:( 1292:) 1288:( 1265:) 1261:( 1252:) 1248:( 1238:) 1234:( 1056:Q 952:) 615:) 607:( 580:) 576:( 566:e 559:t 552:v 505:) 464:. 450:. 421:. 395:. 375:. 355:. 334:. 313:. 287:. 283:: 23:.

Index

Seed (disambiguation)
KISA
Key sizes
Block sizes
Feistel network
Rounds
cryptanalysis
block cipher
Korea Information Security Agency
South Korean
40-bit encryption
web browsers
ActiveX
Internet Explorer
Ministry of Science, ICT and Future Planning
HTML5
Feistel network
128-bit blocks
128-bit key
S-boxes
SAFER
exponentiation
MISTY1
boolean functions
key schedule
TEA
Golden ratio
S/MIME
TLS/SSL
IPSec

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑