• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on Cryptosystems and Their Criteria

Research Project

Project/Area Number 09044149
Research Category

Grant-in-Aid for international Scientific Research

Allocation TypeSingle-year Grants
SectionJoint Research
Research Field 情報システム学(含情報図書館学)
Research InstitutionJapan Advanced Institute of Science and Technology

Principal Investigator

OKAMOTO Eiji  Japan Advanced Institute of Science and Technology, School of Information Science, Professor, 情報科学研究科, 教授 (60242567)

Co-Investigator(Kenkyū-buntansha) PERALTA Rene  University of Wisconsin, Milwaukee, EE&CS,Associate Professor, 電気工学&計算機科学部, 教授
DAVODA George  University of Wisconsin, Milwaukee, EE&CS,Professor, 電気工学&計算機科学部, 教授
DESMEDT Yvo  University of Wisconsin, Milwaukee, EE&CS,Professor, 電気工学&計算機科学部, 教授
MAMBO Masahiro  Tohoku University, Information Processing Education Center, Associate Professor, 情報処理教育センター, 助教授 (60251972)
KUROSAWA Kaoru  Tokyo Institute of Technology, Faculty of Engineering, Professor, 工学部, 教授 (60153409)
Project Period (FY) 1997 – 1998
Project Status Completed (Fiscal Year 1998)
Budget Amount *help
¥4,900,000 (Direct Cost: ¥4,900,000)
Fiscal Year 1998: ¥2,000,000 (Direct Cost: ¥2,000,000)
Fiscal Year 1997: ¥2,900,000 (Direct Cost: ¥2,900,000)
Keywordscryptosystem / factorization / symmetric encryption / asymmetric encryption / random number / timing attack
Research Abstract

Recently, many attacks against cryptosystems have been reported. Differential cryptanalysis and linear cryptanalysis against DES or FEAL are very strong attack methods. The reports of cryptattac have very serious influence among industrial organizations.
Hence, we estimated the strength of cryptattacks presented so far, to make secure cryptsystems. Our research results are,
(a) estimation of the strength of random number generators, and development of a tool of the estimation,
(b) proposal of secure random number generators using random timing of events in personal computers,
(c) factorization of large numbers at fast pararell machine, and its report to Cunningham Project,
(d) estimation of timing attack against exponential type encryption algorithms,
(e) proposal of security agents for copyright, and
(f) proposal of secure key distribution systems.

Report

(3 results)
  • 1998 Annual Research Report   Final Research Report Summary
  • 1997 Annual Research Report
  • Research Products

    (28 results)

All Other

All Publications (28 results)

  • [Publications] 阪口康弘, 岡本栄司: "IPパケットの到着時刻を用いた乱数生成" 1999年暗号と情報セキュリティ シンポジウム予稿集. 491-496 (1999)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] 石川正興, 岡本栄司: "タイミングアタックを用いた暗号解続に関する研究" 電子情報通信学会ISEC97-61. 87-98 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] M.Chapman and G.Davida: "Hiding the Hidden" ICICS'97. 335-345 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] M.Mambo and E.Okamoto: "The Importance of Randomness in Message Recovery" JW-ISC'97. 181-185 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] Y.Desmedt: "Some Recent Research Aspects of Threshold Cryptography" ISW'97. 97-98 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] R.Peralta, M.Mambo and E.Okamoto: "Factoring hard integers on a parallel machine" 電子情報通信学会英論文誌. 658-662 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] 岡本栄司, 満保雅浩: "電子マネー" 岩波書店, 111 (1997)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] Y.Sakaguchi and E.Okamoto: "Random Number Generation Using IP Packet Arrival Time" SCIS'99. (1999)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] M.Chapman and G.Davida: "Hiding the Hidden" ICICS'97. 335-345 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] Y.Desmedt: "Some Recent Research Aspects of Threshold Cryptography" ISW'97. 158-173 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] M.Mambo and E.Okamoto: "The Importance of Randomness in Message Recovery" JW-ISC'97. 181-185 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] R.Peralta, M.Mambo and E.Okamoto: "Factoring Hard Integers on a Parallel Machine" IEICE Trans on Fundamentals. Vol.E80-A,No.4. 658-662 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] M.Ishikawa and E.Okamoto: "Cryptanalysis of Discrete Logarithm Cryyptosystems Using Timing Attack" Technical Report of IEICE. ISEC97-61. 87-98 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] E.Okamoto and M.Mambo: Electronic Money. Iwanami Shoten, (1997)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1998 Final Research Report Summary
  • [Publications] 阪口康弘、岡本栄司: "IPパケットの到着時刻を用いた乱数生成" 1999年暗号と情報セキュリティシンポジウム予稿集. 491-196 (1999)

    • Related Report
      1998 Annual Research Report
  • [Publications] 石川正興、岡本栄司: "タイミングアタックを用いた暗号解読に関する研究" 電子情報通信学会ISEC97-61. 87-98 (1997)

    • Related Report
      1998 Annual Research Report
  • [Publications] M.Chapman and G.Davida: "Hiding the Hidden" ICICS'97. 335-345 (1997)

    • Related Report
      1998 Annual Research Report
  • [Publications] M.Mambo and E.Okamoto: "The Importance of Randomness in Message Recovery" JW-ISC'97. 181-185 (1997)

    • Related Report
      1998 Annual Research Report
  • [Publications] Y.Desmedt: "Some Recent Research Aspects of Threshold Cryptography" ISW'98. 97-98 (1997)

    • Related Report
      1998 Annual Research Report
  • [Publications] R.Peralta,M.Mambo and E.Okamoto: ""Factoring hard integers on a parallel machine"" 電子情報通信学会英論文誌. 658-662 (1997)

    • Related Report
      1998 Annual Research Report
  • [Publications] 岡本栄司,満保雅浩: "電子マネー" 岩波書店, 111 (1997)

    • Related Report
      1998 Annual Research Report
  • [Publications] K.Cishi, M.Mambo and E.Okamoto: ""Anonymous public key certificates and their applications" "電子情報通信学会英論文誌. VOL.E81-A No.1. 56-64 (1998)

    • Related Report
      1997 Annual Research Report
  • [Publications] 石川 正興, 岡本 栄司: "タイミングアタックを用いた暗号解読に関する研究" 電子情報通信学会ISEC97-61. 87-98 (1997)

    • Related Report
      1997 Annual Research Report
  • [Publications] M.Chapman and G.David: "Hiding the Hidden" ICICS'97. 335-345 (1997)

    • Related Report
      1997 Annual Research Report
  • [Publications] M.Mambo and E.Okamoto: "The Importance of Randaomness in Message Recovery" JW-ISC'97. 181-185 (1997)

    • Related Report
      1997 Annual Research Report
  • [Publications] Y.Desmedt: "Some Recent Research Aspects of Threshold Crytography" ISW'98. 97-98 (1997)

    • Related Report
      1997 Annual Research Report
  • [Publications] R.Peralta, M.Mambo and E.Okamoto: ""Factoring hard integers on a parallel machine"" 電子情報通信学会英論文誌. VOL.E80-A NO.4. 658-662 (1997)

    • Related Report
      1997 Annual Research Report
  • [Publications] 岡本 栄司、満保 雅浩: "電子マネー" 岩波書店, 111 (1997)

    • Related Report
      1997 Annual Research Report

URL: 

Published: 1997-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi