Advertisement

Update on SEED: SEED-192/256

  • Kitae Jeong
  • Joongeun Choi
  • Yuseop Lee
  • Changhoon Lee
  • Jaechul Sung
  • Haeryong Park
  • Yeonjung Kang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5576)

Abstract

SEED is a 128-bit block cipher with a 128-bit secret key. Since it supports only a 128-bit secret key, it is difficult to apply this algorithm to various environments. In this paper, we propose SEED-192/256 which support 192/256-bit secret keys, respectively. Also we evaluate the security these algorithms against well-known attacks and the software performance of them on PC environments.

Keywords

Block Ciphers SEED 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-bit Block Cipher Suitable Multiple Platforms - Design and Analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 39–56. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    CRYPTREC Evaluation Committee, SEED Evaluation Report (2002)Google Scholar
  3. 3.
    Korea Information Security Agency, SEED Algorithm Specification, http://www.kisa.or.kr/kisa/seed/down/SEED_Specification_english.pdf
  4. 4.
    Korea Information Security Agency, SEED Algorithm Self Evaluation, http://www.kisa.or.kr/kisa/seed/down/SEED_Self_Evaluation-English.pdf
  5. 5.
    Kwon, D., Kim, J., Park, S., Sung, S., Sohn, Y., Song, J., Yeom, Y., Yoon, E., Lee, S., Lee, J., Chee, S., Han, D., Hong, J.: New Block Cipher: ARIA. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 443–456. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    NIST, FIPS 197: Advanced Encryption Standard (2001)Google Scholar
  7. 7.
    Yanami, H., Shimoyama, T.: Differential Cryptanalysis of a Reduced-Round SEED. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 186–198. Springer, Heidelberg (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Kitae Jeong
    • 1
  • Joongeun Choi
    • 1
  • Yuseop Lee
    • 1
  • Changhoon Lee
    • 2
  • Jaechul Sung
    • 3
  • Haeryong Park
    • 4
  • Yeonjung Kang
    • 4
  1. 1.Center for Information Security Technologies(CIST)Korea UniversityKorea
  2. 2.School of Computer EngineeringHanshin UniversityKorea
  3. 3.Department of MathematicsUniversity of SeoulKorea
  4. 4.Korea Information Security Agency(KISA)Korea

Personalised recommendations