{"draft":"draft-lee-rfc4009bis-02","doc_id":"RFC4269","title":"The SEED Encryption Algorithm","authors":["H.J. Lee","S.J. Lee","J.H. Yoon","D.H. Cheon","J.I. Lee"],"format":["ASCII","HTML"],"page_count":"16","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IETF - NON WORKING GROUP","abstract":"This document describes the SEED encryption algorithm, which has been\r\nadopted by most of the security systems in the Republic of Korea.\r\nIncluded are a description of the encryption and the key scheduling\r\nalgorithm (Section 2), the S-boxes (Appendix A), and a set of test\r\nvectors (Appendix B).\r\n\r\nThis document obsoletes RFC 4009. This memo provides information for the Internet community.","pub_date":"November 2005","keywords":["encryption algorithm","seed cbc","seed oid"],"obsoletes":["RFC4009"],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4269","errata_url":null}