80 likes | 282 Views
SEED Overview ‘Use of the SEED Encryption Algorithm in CMS’. November 11, 2003 Jongwook Park, KISA (khopri@kisa.or.kr). SEED Introduction. Developed by KISA since 1998 Feistel structure with 16 rounds 128-bit input/output data block size 128-bit key length
E N D
SEED Overview‘Use of the SEED Encryption Algorithm in CMS’ November 11, 2003 Jongwook Park, KISA (khopri@kisa.or.kr)
SEED Introduction • Developed by KISA since 1998 • Feistel structure with 16 rounds • 128-bit input/output data block size • 128-bit key length • Robust against known attacks such as DC, LC and key related attacks • Adopted to most of the security systems in Korea as a mandatory (e.g. cellular phone (WPKI), e-Government, Smartcard, Internet Banking…) • Effectively implemented in software as well as hardware • Licensing or royalty payments are not required
R0(64) C D L0(64) K0(64) Ki0 Ki1 F R1(64) L1(64) G K1(64) + F G L2(64) R2(64) + G + K15(64) F C’ D’ L16(64) R16(64) + i : Round A B = A + B mod 232 Overall Structure of the SEED
SEED in CMS • Content Encryption • Define id-seedCBC OID • Parameter field must have IV • Plain text padded before encrypt by number of appended octets • Key Wrap • Define id-npki-app-cmsSeed-wrap OID • Identical to Section 2.2.1 ofRFC3394 (Key Wrap) with ‘AES’ replaced by ‘SEED’ • OID Parameter field must be NULL
Way Forward • Publish the SEED algorithm itself as an informational RFC before Seoul meeting • Currently available SEED homepage (include source code and more…) • http://www.kisa.or.kr/seed/index.html • Look for any comments from the list • Watch for any ISO/IEC JTC1/SC 27 feedback and raise any significant issues to the WG