<s>
In	O
cryptography	O
,	O
Camellia	B-Algorithm
is	O
a	O
symmetric	B-Algorithm
key	I-Algorithm
block	O
cipher	O
with	O
a	O
block	O
size	O
of	O
128	O
bits	O
and	O
key	O
sizes	O
of	O
128	O
,	O
192	O
and	O
256	O
bits	O
.	O
</s>
<s>
The	O
cipher	O
has	O
security	O
levels	O
and	O
processing	O
abilities	O
comparable	O
to	O
the	O
Advanced	B-Algorithm
Encryption	I-Algorithm
Standard	I-Algorithm
.	O
</s>
<s>
It	O
is	O
part	O
of	O
the	O
Transport	B-Protocol
Layer	I-Protocol
Security	I-Protocol
(	O
TLS	O
)	O
cryptographic	B-Protocol
protocol	I-Protocol
designed	O
to	O
provide	O
communications	O
security	O
over	O
a	O
computer	B-Architecture
network	I-Architecture
such	O
as	O
the	O
Internet	O
.	O
</s>
<s>
The	O
cipher	O
was	O
named	O
for	O
the	O
flower	O
Camellia	B-Algorithm
japonica	O
,	O
which	O
is	O
known	O
for	O
being	O
long-lived	O
as	O
well	O
as	O
because	O
the	O
cipher	O
was	O
developed	O
in	O
Japan	O
.	O
</s>
<s>
Camellia	B-Algorithm
is	O
a	O
Feistel	B-Algorithm
cipher	I-Algorithm
with	O
either	O
18	O
rounds	O
(	O
when	O
using	O
128-bit	O
keys	O
)	O
or	O
24	O
rounds	O
(	O
when	O
using	O
192	O
-	O
or	O
256-bit	O
keys	O
)	O
.	O
</s>
<s>
Camellia	B-Algorithm
uses	O
four	O
8×	O
8-bit	O
S-boxes	B-Algorithm
with	O
input	O
and	O
output	O
affine	B-Algorithm
transformations	I-Algorithm
and	O
logical	O
operations	O
.	O
</s>
<s>
The	O
cipher	O
also	O
uses	O
input	O
and	O
output	O
key	B-Algorithm
whitening	I-Algorithm
.	O
</s>
<s>
The	O
diffusion	O
layer	O
uses	O
a	O
linear	B-Architecture
transformation	I-Architecture
based	O
on	O
a	O
matrix	B-Architecture
with	O
a	O
branch	O
number	O
of	O
5	O
.	O
</s>
<s>
Camellia	B-Algorithm
is	O
considered	O
a	O
modern	O
,	O
safe	O
cipher	O
.	O
</s>
<s>
The	O
Japanese	O
cipher	O
has	O
security	O
levels	O
and	O
processing	O
abilities	O
comparable	O
to	O
the	O
AES/Rijndael	B-Algorithm
cipher	O
.	O
</s>
<s>
Camellia	B-Algorithm
is	O
a	O
block	O
cipher	O
which	O
can	O
be	O
completely	O
defined	O
by	O
minimal	O
systems	O
of	O
multivariate	O
polynomials	O
:	O
</s>
<s>
The	O
Camellia	B-Algorithm
(	O
as	O
well	O
as	O
AES	B-Algorithm
)	O
S-boxes	B-Algorithm
can	O
be	O
described	O
by	O
a	O
system	O
of	O
23	O
quadratic	O
equations	O
in	O
80	O
terms	O
.	O
</s>
<s>
The	O
key	B-Algorithm
schedule	I-Algorithm
can	O
be	O
described	O
by	O
equations	O
in	O
768	O
variables	O
using	O
linear	O
and	O
quadratic	O
terms	O
.	O
</s>
<s>
The	O
number	O
of	O
free	O
terms	O
is	O
,	O
which	O
is	O
approximately	O
the	O
same	O
number	O
as	O
for	O
AES	B-Algorithm
.	O
</s>
<s>
Theoretically	O
,	O
such	O
properties	O
might	O
make	O
it	O
possible	O
to	O
break	O
Camellia	B-Algorithm
(	O
and	O
AES	B-Algorithm
)	O
using	O
an	O
algebraic	O
attack	O
,	O
such	O
as	O
extended	O
sparse	O
linearisation	O
,	O
in	O
the	O
future	O
,	O
provided	O
that	O
the	O
attack	O
becomes	O
feasible	O
.	O
</s>
<s>
Although	O
Camellia	B-Algorithm
is	O
patented	O
,	O
it	O
is	O
available	O
under	O
a	O
royalty-free	O
license	O
.	O
</s>
<s>
This	O
has	O
allowed	O
the	O
Camellia	B-Algorithm
cipher	O
to	O
become	O
part	O
of	O
the	O
OpenSSL	B-Language
Project	O
,	O
under	O
an	O
open-source	O
license	O
,	O
since	O
November	O
2006	O
.	O
</s>
<s>
It	O
has	O
also	O
allowed	O
it	O
to	O
become	O
part	O
of	O
the	O
Mozilla	B-Operating_System
's	O
NSS	B-Protocol
(	O
Network	B-Protocol
Security	I-Protocol
Services	I-Protocol
)	O
module	O
.	O
</s>
<s>
Support	O
for	O
Camellia	B-Algorithm
was	O
added	O
to	O
the	O
final	O
release	O
of	O
Mozilla	B-Application
Firefox	I-Application
3	O
in	O
2008	O
(	O
disabled	O
by	O
default	O
as	O
of	O
Firefox	B-Application
33	O
in	O
2014	O
in	O
spirit	O
of	O
the	O
"	O
Proposal	O
to	O
Change	O
the	O
Default	O
TLS	O
Ciphersuites	O
Offered	O
by	O
Browsers	O
"	O
,	O
and	O
has	O
been	O
dropped	O
from	O
version	O
37	O
in	O
2015	O
)	O
.	O
</s>
<s>
Pale	B-Protocol
Moon	I-Protocol
,	O
a	O
fork	O
of	O
Mozilla/Firefox	O
,	O
continues	O
to	O
offer	O
Camellia	B-Algorithm
and	O
had	O
extended	O
its	O
support	O
to	O
include	O
Galois/Counter	B-Algorithm
mode	I-Algorithm
(	O
GCM	O
)	O
suites	O
with	O
the	O
cipher	O
,	O
but	O
has	O
removed	O
the	O
GCM	B-Algorithm
modes	I-Algorithm
again	O
with	O
release	O
27.2.0	O
,	O
citing	O
the	O
apparent	O
lack	O
of	O
interest	O
in	O
them	O
.	O
</s>
<s>
Later	O
in	O
2008	O
,	O
the	O
FreeBSD	B-Operating_System
Release	O
Engineering	O
Team	O
announced	O
that	O
the	O
cipher	O
had	O
also	O
been	O
included	O
in	O
the	O
FreeBSD	B-Operating_System
6.4-RELEASE	O
.	O
</s>
<s>
Also	O
,	O
support	O
for	O
the	O
Camellia	B-Algorithm
cipher	O
was	O
added	O
to	O
the	O
disk	O
encryption	O
storage	O
class	O
geli	B-Application
of	O
FreeBSD	B-Operating_System
by	O
Yoshisato	O
Yanagisawa	O
.	O
</s>
<s>
In	O
September	O
2009	O
,	O
GNU	B-Application
Privacy	I-Application
Guard	I-Application
added	O
support	O
for	O
Camellia	B-Algorithm
in	O
version	O
1.4.10	O
.	O
</s>
<s>
VeraCrypt	B-Operating_System
(	O
a	O
fork	O
of	O
TrueCrypt	B-Application
)	O
included	O
Camellia	B-Algorithm
as	O
one	O
of	O
its	O
supported	O
encryption	O
algorithms	O
.	O
</s>
<s>
Moreover	O
,	O
various	O
popular	O
security	B-Library
libraries	I-Library
,	O
such	O
as	O
Crypto++	B-Language
,	O
GnuTLS	B-Application
,	O
mbed	B-Language
TLS	I-Language
and	O
OpenSSL	B-Language
also	O
include	O
support	O
for	O
Camellia	B-Algorithm
.	O
</s>
<s>
Thales	O
and	O
Bloombase	O
support	O
Camellia	B-Algorithm
encryption	O
cipher	O
with	O
their	O
data	O
cryptography	O
offerings	O
.	O
</s>
<s>
On	O
March	O
26	O
,	O
2013	O
,	O
Camellia	B-Algorithm
was	O
announced	O
as	O
having	O
been	O
selected	O
again	O
for	O
adoption	O
in	O
Japan	O
's	O
new	O
e-Government	O
Recommended	O
Ciphers	O
List	O
as	O
the	O
only	O
128-bit	O
block	O
cipher	O
encryption	O
algorithm	O
developed	O
in	O
Japan	O
.	O
</s>
<s>
The	O
selection	O
was	O
based	O
on	O
Camellia	B-Algorithm
's	O
high	O
reputation	O
for	O
ease	O
of	O
procurement	O
,	O
and	O
security	O
and	O
performance	O
features	O
comparable	O
to	O
those	O
of	O
the	O
Advanced	B-Algorithm
Encryption	I-Algorithm
Standard	I-Algorithm
(	O
AES	B-Algorithm
)	O
.	O
</s>
<s>
Camellia	B-Algorithm
remains	O
unbroken	O
in	O
its	O
full	O
implementation	O
.	O
</s>
<s>
An	O
impossible	O
differential	O
attack	O
on	O
12-round	O
Camellia	B-Algorithm
without	O
FL/FL	O
−1	O
layers	O
does	O
exist	O
.	O
</s>
<s>
The	O
S-boxes	B-Algorithm
used	O
by	O
Camellia	B-Algorithm
share	O
a	O
similar	O
structure	O
to	O
AES	B-Algorithm
's	O
S-box	B-Algorithm
.	O
</s>
<s>
As	O
a	O
result	O
,	O
it	O
is	O
possible	O
to	O
accelerate	O
Camellia	B-Algorithm
software	O
implementations	O
using	O
CPU	O
instruction	O
sets	O
designed	O
for	O
AES	B-Algorithm
,	O
such	O
as	O
x86	O
AES-NI	B-Algorithm
or	O
x86	O
GFNI	O
,	O
by	O
affine	O
isomorphism	O
.	O
</s>
<s>
Camellia	B-Algorithm
has	O
been	O
certified	O
as	O
a	O
standard	O
cipher	O
by	O
several	O
standardization	O
organizations	O
:	O
</s>
