• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Security Analysis of Elliptic/Hyperelliptic Curve Cryptosystems Against Cover Attack

Research Project

Project/Area Number 15K00022
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Theory of informatics
Research InstitutionChuo University

Principal Investigator

Chao Jinhui  中央大学, 理工学部, 教授 (60227345)

Co-Investigator(Renkei-kenkyūsha) SHIMURA Mahoro  東海大学, 理学部, 准教授 (30308209)
Research Collaborator IIJIMA Tsutomu  光電株式会社, 特機部, 研究員
Project Period (FY) 2015-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥4,550,000 (Direct Cost: ¥3,500,000、Indirect Cost: ¥1,050,000)
Fiscal Year 2017: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2016: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2015: ¥1,690,000 (Direct Cost: ¥1,300,000、Indirect Cost: ¥390,000)
KeywordsCryptography / Elliptic Curve / Security Analysis / GHS attacks / Cover Attakcs / IoT Cryptosystems / Hardware Implementation / Extension Fields / 楕円暗号 / 超楕円暗号 / GHS攻撃 / 被覆攻撃 / 有限拡大体 / IoT暗号 / 安全性解析 / 楕円曲線暗号 / 超楕円曲線暗号 / 暗号理論 / 情報セキュリティ / 公開鍵暗号 / 楕円曲線 / 超楕円曲線 / GHS攻撃
Outline of Final Research Achievements

Elliptic curve and hyperelliptic curve based cryptosystems are the most secure systems available now comparing with those based on factorization and discrete logarithm. Moreover using the definition fields as finite extensions of finite fields, fast and compact implementation of these systems become possible, which are then expected to play an important role in IoT technology. On the other hand, aiming at curves over extension fields, the GHS attack was proposed by Frey first then generalized to cover attack. This research present the first and complete security analysis on cover attack and GHS attack. We show that these attacks are very powerful. By a systematic analysis of the mathematical structure, we proposed algorithms to mathematically classify all curves which are subjected to these attacks. Then we obtain a complete list of all weak curves which will be useful in system design. We also discuss variations of these attacks and methodology to build a secure cryptosystem.

Report

(4 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Research-status Report
  • 2015 Research-status Report
  • Research Products

    (18 results)

All 2018 2017 2016 2015

All Journal Article (12 results) (of which Peer Reviewed: 3 results,  Open Access: 10 results) Presentation (6 results) (of which Int'l Joint Research: 1 results,  Invited: 1 results)

  • [Journal Article] On implementation of GHS attack against elliptic curve cryptosystems over cubic extension fields of odd characteristic2018

    • Author(s)
      Naoki Hashizume, Fumiyuki Momose, Jinhui Chao
    • Journal Title

      Number Theory Related to Modular Curves, Contemporary Mathematics, Amer. Math. Soc.

      Volume: 701 Pages: 125-150

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] 被覆曲線を持つ奇標数合成次拡大体上の楕円曲線の分類2018

    • Author(s)
      小林龍平、飯島努、趙晋輝
    • Journal Title

      Proceedings of SCIS2018

      Volume: 1

    • Related Report
      2017 Annual Research Report
  • [Journal Article] Examination of classifying hoaxes over SNS using Bayesian Network2018

    • Author(s)
      Ryutaro Ushigome, Takeshi Matsuda, Michio Sonoda and Jinhui Chao
    • Journal Title

      Procedings of CANDAR 2017: The Fifth International Symposium on Computing and Networking

      Volume: 1 Pages: 606-608

    • DOI

      10.1109/candar.2017.103

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristic2017

    • Author(s)
      Naoki Hashizume, Fumiyuki Momose, and Jinhui Chao
    • Journal Title

      Contemporary Mathematics, AMS

      Volume: I Pages: 1-25

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] GHS攻撃の対象となる奇標数合成数次拡大体上の楕円曲線の分類2017

    • Author(s)
      小林 龍平、飯島 努、趙 晋輝
    • Journal Title

      Proceedings of SCIS, Symposium on Cryptography and Information Security, 2017

      Volume: 4B1-2 Pages: 1-8

    • Related Report
      2016 Research-status Report
    • Open Access
  • [Journal Article] GHS攻撃の対象となる奇標数合成数次拡大体上の楕円曲線の分類 その22017

    • Author(s)
      小林 龍平、飯島 努、趙 晋輝
    • Journal Title

      電子情報通信学会信学技報ISEC2016-95

      Volume: vol. 116, no. 505 Pages: 41-48

    • Related Report
      2016 Research-status Report
    • Open Access
  • [Journal Article] 単純拡大を用いた偶標数有限体上の楕円曲線の被覆曲線の構成2017

    • Author(s)
      久木﨑聖矢志村真帆呂、趙 晋輝
    • Journal Title

      電子情報通信学会ISEC信学技報ISEC2016-101

      Volume: vol. 116, no. 505 Pages: 79-83

    • Related Report
      2016 Research-status Report
    • Open Access
  • [Journal Article] 偶標数素数次拡大体上の楕円曲線に基づく射影直線上の(2,...,2)型被覆の構成法に関する考察2017

    • Author(s)
      森下拓也、志村真帆呂、趙 晋輝
    • Journal Title

      電子情報通信学会ISEC信学技報ISEC2016-102

      Volume: vol. 116, no. 505 Pages: 85-89

    • Related Report
      2016 Research-status Report
    • Open Access
  • [Journal Article] GHS攻撃の対象となる奇標数素数次拡大体上種数2の曲線の完全分類2016

    • Author(s)
      小林 龍平、飯島 努、趙 晋輝
    • Journal Title

      Proceedings of SCIS2016暗号と情報セキュリティシンポ

      Volume: 4D1-3 Pages: 1-8

    • Related Report
      2015 Research-status Report
    • Open Access
  • [Journal Article] GHS攻撃の対象となる楕円曲線の同型攻撃に関する考察2016

    • Author(s)
      飯島 努、志村真帆呂、趙 晋輝
    • Journal Title

      Proceedings of SCIS2016暗号と情報セキュリティシンポ

      Volume: 4D1-2 Pages: 1-8

    • Related Report
      2015 Research-status Report
    • Open Access
  • [Journal Article] Fault attacks to elliptic curve cryptosystems with definition equation errors2016

    • Author(s)
      Hiroyoshi Hayashi, Jinhui Chao
    • Journal Title

      Proceedings of SCIS2016暗号と情報セキュリティシンポ

      Volume: 4D2-1 Pages: 1-8

    • Related Report
      2015 Research-status Report
    • Open Access
  • [Journal Article] ECM over dummy quadratic residue rings2016

    • Author(s)
      Takuya Morishita, Jinhui Chao
    • Journal Title

      Proceedings of SCIS2016暗号と情報セキュリティシンポ

      Volume: 4D2-5 Pages: 1-8

    • Related Report
      2015 Research-status Report
    • Open Access
  • [Presentation] Recent Topics on elliptic and hyperelliptic cryptosystems2017

    • Author(s)
      Jinhui Chao
    • Organizer
      Seminari Teoria de Nombres de Barcelona (UB-UAB-UPC)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] 擬似的2次拡大環上の楕円曲線法2015

    • Author(s)
      森下拓也・趙 晋輝
    • Organizer
      第14回情報技術フォーラム、FIT2015
    • Place of Presentation
      松山市
    • Year and Date
      2015-09-15
    • Related Report
      2015 Research-status Report
  • [Presentation] 楕円曲線暗号における曲線パラメータに対するFault攻撃2015

    • Author(s)
      林 弘悦・趙 晋輝
    • Organizer
      第14回情報技術フォーラム、FIT2015
    • Place of Presentation
      松山市
    • Year and Date
      2015-09-15
    • Related Report
      2015 Research-status Report
  • [Presentation] サイドチャネル攻撃に安全なGranger-Scott法2015

    • Author(s)
      久木﨑聖矢・松尾和人, 趙 晋輝
    • Organizer
      第14回情報技術フォーラム、FIT2015
    • Place of Presentation
      松山市
    • Year and Date
      2015-09-15
    • Related Report
      2015 Research-status Report
  • [Presentation] 線形分類器によるクロスサイトスクリプティング(XSS)攻撃の検知に関する考察2015

    • Author(s)
      梅原章宏・松田 健・園田道夫・水野信也・趙 晋輝
    • Organizer
      第14回情報技術フォーラム、FIT2015
    • Place of Presentation
      松山市
    • Year and Date
      2015-09-15
    • Related Report
      2015 Research-status Report
  • [Presentation] 16進数コードの出現状況に着目したバッファオーバーフロー攻撃の特徴抽出2015

    • Author(s)
      南後吉秀・松田 健・園田道夫・趙 晋輝
    • Organizer
      第14回情報技術フォーラム、FIT2015
    • Place of Presentation
      松山市
    • Year and Date
      2015-09-15
    • Related Report
      2015 Research-status Report

URL: 

Published: 2015-04-16   Modified: 2019-03-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi