{"draft":"draft-adams-cast-256-00","doc_id":"RFC2612","title":" The CAST-256 Encryption Algorithm ","authors":["C. Adams","J. Gilchrist"],"format":["ASCII","HTML"],"page_count":"19","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Legacy","abstract":" This document describes an existing algorithm that can be used to satisfy this requirement. Included are a description of the cipher and the key scheduling algorithm, the s-boxes, and a set of test vectors (Appendix A). This memo provides information for the Internet community. ","pub_date":"May 1999","keywords":["security","cryptology"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC2612","errata_url":null}