{"draft":"draft-park-seed-01","doc_id":"RFC4009","title":" The SEED Encryption Algorithm ","authors":["J. Park","S. Lee","J. Kim","J. Lee"],"format":["ASCII","HTML"],"page_count":"17","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IETF - NON WORKING GROUP","abstract":" This document describes the SEED encryption algorithm, which has been adopted by most of the security systems in the Republic of Korea. Included are a description of the cipher and the key scheduling algorithm (Section 2), the S-boxes (Appendix A), and a set of test vectors (Appendix B). This memo provides information for the Internet community. ","pub_date":"January 2005","keywords":["encryption algorithm","seed cbc","seed oid"],"obsoletes":[],"obsoleted_by":["RFC4269"],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4009","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc4009"}