Project/Area Number |
09044149
|
Research Category |
Grant-in-Aid for international Scientific Research
|
Allocation Type | Single-year Grants |
Section | Joint Research |
Research Field |
情報システム学(含情報図書館学)
|
Research Institution | Japan Advanced Institute of Science and Technology |
Principal Investigator |
OKAMOTO Eiji Japan Advanced Institute of Science and Technology, School of Information Science, Professor, 情報科学研究科, 教授 (60242567)
|
Co-Investigator(Kenkyū-buntansha) |
PERALTA Rene University of Wisconsin, Milwaukee, EE&CS,Associate Professor, 電気工学&計算機科学部, 教授
DAVODA George University of Wisconsin, Milwaukee, EE&CS,Professor, 電気工学&計算機科学部, 教授
DESMEDT Yvo University of Wisconsin, Milwaukee, EE&CS,Professor, 電気工学&計算機科学部, 教授
MAMBO Masahiro Tohoku University, Information Processing Education Center, Associate Professor, 情報処理教育センター, 助教授 (60251972)
KUROSAWA Kaoru Tokyo Institute of Technology, Faculty of Engineering, Professor, 工学部, 教授 (60153409)
|
Project Period (FY) |
1997 – 1998
|
Project Status |
Completed (Fiscal Year 1998)
|
Budget Amount *help |
¥4,900,000 (Direct Cost: ¥4,900,000)
Fiscal Year 1998: ¥2,000,000 (Direct Cost: ¥2,000,000)
Fiscal Year 1997: ¥2,900,000 (Direct Cost: ¥2,900,000)
|
Keywords | cryptosystem / factorization / symmetric encryption / asymmetric encryption / random number / timing attack |
Research Abstract |
Recently, many attacks against cryptosystems have been reported. Differential cryptanalysis and linear cryptanalysis against DES or FEAL are very strong attack methods. The reports of cryptattac have very serious influence among industrial organizations. Hence, we estimated the strength of cryptattacks presented so far, to make secure cryptsystems. Our research results are, (a) estimation of the strength of random number generators, and development of a tool of the estimation, (b) proposal of secure random number generators using random timing of events in personal computers, (c) factorization of large numbers at fast pararell machine, and its report to Cunningham Project, (d) estimation of timing attack against exponential type encryption algorithms, (e) proposal of security agents for copyright, and (f) proposal of secure key distribution systems.
|