A Description of KCipher-2 Encryption Algorithm
draft-kiyomoto-kcipher2-06

The information below is for an old version of the document
Document Type Expired Internet-Draft (individual)
Last updated 2012-06-21 (latest revision 2011-12-19)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html
IETF conflict review conflict-review-kiyomoto-kcipher2
Stream Stream state (No stream defined)
Document shepherd None
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)
RFC Editor RFC Editor state ISR

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-kiyomoto-kcipher2-06.txt

Abstract

This document describes the KCipher-2 encryption algorithm. KCipher-2 is a stream cipher with a 128-bit key and a 128-bit initialization vector. Since the algorithm for KCipher-2 was published in 2007, security and efficiency have been rigorously evaluated through academic and industrial studies. No security vulnerability has been found as of the time this document was written. KCipher-2 offers fast encryption and decryption by means of simple operations that enable efficient implementation. KCipher-2 has been used for industrial applications, especially for mobile health monitoring and diagnostic services in Japan.

Authors

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)