• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

暗号システムに対する実装攻撃の適用と限界に関する計算論的研究

Research Project

Project/Area Number 16092221
Research Category

Grant-in-Aid for Scientific Research on Priority Areas

Allocation TypeSingle-year Grants
Review Section Science and Engineering
Research InstitutionKyushu University

Principal Investigator

櫻井 幸一  Kyushu University, 大学院・システム情報科学研究院, 教授 (60264066)

Co-Investigator(Kenkyū-buntansha) 田端 利宏 (田畑 利宏)  岡山大学, 大学院・自然科学研究科, 准教授 (80359942)
酒井 康行  三菱電機株式会社, 情報技術総合研究所, 主任研究員 (80426585)
高木 剛  公立はこだて未来大学, システム情報科学部, 准教授 (60404802)
Project Period (FY) 2004 – 2007
Project Status Completed (Fiscal Year 2007)
Budget Amount *help
¥14,400,000 (Direct Cost: ¥14,400,000)
Fiscal Year 2007: ¥3,600,000 (Direct Cost: ¥3,600,000)
Fiscal Year 2006: ¥3,600,000 (Direct Cost: ¥3,600,000)
Fiscal Year 2005: ¥3,600,000 (Direct Cost: ¥3,600,000)
Fiscal Year 2004: ¥3,600,000 (Direct Cost: ¥3,600,000)
Keywords暗号 / 認証 / 情報基礎 / 数理工学 / 情報システム / 暗号、認証等 / アルゴリズム / 暗号認証等 / 楕円曲線暗号 / 実装攻撃 / 電力解析 / メルセンヌ素数 / unifiod code / 公開鍵暗号 / 剰余算
Research Abstract

断片的に提案されている暗号アルゴリズムへの種々の実装攻撃に対して計算論的な立場からその限界を明らかし、現実性のある脅威かどうかの客観的評価指標を検討した。また、耐タンパ性を有するワードウエアを仮定し、公開鍵暗号を利用せず、非対称原理を実現する暗号システムの設計を行った。研究最終年として、最新研究動向とまとめを行った。暗号システムの実装攻撃への安全性としては、情報理論的な尺度を用いて、安全性の議論がはじまっている。耐タンパ性を有する計算機環境としては、特殊なハードウエアを仮定せずに、OSやVMなどのミドルウエアで、耐タンパ環境を実現する研究がおこなわれることが注目される。今後は、こうした新しい試みに対する計算機科学的・理論的な、モデル化と考察を考えている。

Report

(4 results)
  • 2007 Annual Research Report
  • 2006 Annual Research Report
  • 2005 Annual Research Report
  • 2004 Annual Research Report
  • Research Products

    (21 results)

All 2008 2007 2006 2005 2004 Other

All Journal Article (18 results) (of which Peer Reviewed: 3 results) Presentation (1 results) Remarks (2 results)

  • [Journal Article] Short Memory Scalar Multiplication2008

    • Author(s)
      Camille, Vuillaume・Katsuyuki, Okeya・Tsuyoshi, Takagi
    • Journal Title

      IEEE Transactions on Computers Vol. 57, No. 4

      Pages: 481-489

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Characterizing Economic and Social Porperties of Trust and Reputation Systems in P2P Environment2008

    • Author(s)
      Yufeng, Wang・Yoshiaki, Hori・Kouichi, Sakurai
    • Journal Title

      Journal of Computer Science and Technolgy Vol. 23, No. 1

      Pages: 129-140

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Privacy-Preserving Two-Party K-Means Clustering Via Secure Approximation2007

    • Author(s)
      Chunhua, Su・Feng, Bao・Jian ying, Zhou・Tsuyoshi, Takahi・Kouichi, Sakurai
    • Journal Title

      2007 IEEE International Symposium on Data Mining and Information Retrieval Proc単巻

      Pages: 385-391

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant2006

    • Author(s)
      Kenji Imamoto et al.
    • Journal Title

      Prof. of the First International Conference on Information Security and Computer Forensics

      Pages: 41-47

    • Related Report
      2006 Annual Research Report
  • [Journal Article] On studying P2P topology construction based on virtual region and its effect on search performance2006

    • Author(s)
      Yufeng Wang et al.
    • Journal Title

      Prof. of the Third International Conference on Ubiquitous Intelligence and Computing (Springer LNCS) 4159

      Pages: 1008-1018

    • Related Report
      2006 Annual Research Report
  • [Journal Article] One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange2006

    • Author(s)
      Jeong Ok Kwon et al.
    • Journal Title

      Proc. of the Tenth IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security (Springer LNCS) 4237

      Pages: 87-96

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields2006

    • Author(s)
      Tae Hyun Kim et al.
    • Journal Title

      Proc. of the fifth International Conference on Cryptology and Network Security (Springer LNCS) 4301

      Pages: 168-181

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Security Analysis of CRT-Based Cryptosystems2006

    • Author(s)
      Katsuyuki Okeya et al.
    • Journal Title

      International Journal of Information Security, IJIS Vol. 5, No. 3

      Pages: 177-185

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Defeating Simple Power Analysis on Koblitz Curves2006

    • Author(s)
      Camille Vuillaume et al.
    • Journal Title

      IEICE Transactions on Fundamentals Vol. E89-A, No. 5

      Pages: 1362-1369

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Fast Modular Reduction with NIST Recommended Elliptic Curves2005

    • Author(s)
      Yasuyuki Sakai, Kouichi Sakurai
    • Journal Title

      Proc. Information and Communications Security, 7th International Conference, ICICS 2005 LNCS. Vol 3783

      Pages: 169-180

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems2005

    • Author(s)
      Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi
    • Journal Title

      IEEE Transactions on Computers Vol.55 No.1

      Pages: 48-57

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow2005

    • Author(s)
      Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai
    • Journal Title

      Proc. Embedded and Ubiquitous Computing - EUC 2005 Workshops LNCS No.2823

      Pages: 916-925

    • Related Report
      2005 Annual Research Report
  • [Journal Article] 現実の脅威「サイドチャネル解析」(1)2005

    • Author(s)
      酒井 康行, 佐伯 稔, 鈴木 大輔, 佐藤 恒夫
    • Journal Title

      日経エレクトロニクス No.904

      Pages: 141-153

    • Related Report
      2005 Annual Research Report
  • [Journal Article] 現実の脅威「サイドチャネル解析」(2)2005

    • Author(s)
      酒井 康行, 佐伯 稔, 鈴木 大輔, 佐藤 恒夫
    • Journal Title

      日経エレクトロニクス no.905

      Pages: 125-131

    • Related Report
      2005 Annual Research Report
  • [Journal Article] 現実の脅威「サイドチャネル解析」(終)2005

    • Author(s)
      酒井 康行, 佐藤 恒夫, 鈴木 大輔, 泉 幸雄, 佐伯 稔
    • Journal Title

      日経エレクトロニクス no.906

      Pages: 131-139

    • Related Report
      2005 Annual Research Report
  • [Journal Article] 楕円曲線暗号のための剰余算に対するサイドチャネル解析2005

    • Author(s)
      酒井康行, 櫻井幸一
    • Journal Title

      暗号と情報セキュリティシンポジウム(SCIS2005)

    • Related Report
      2004 Annual Research Report
  • [Journal Article] A New Attack with Side Channel Leakage During Exponent Recoding Computations2004

    • Author(s)
      Yasuyuki Sakai, Kouichi Sakurai
    • Journal Title

      Proc.Cryptographic Hardware and Embedded Systems - CHES 2004 : 6th International Workshop LNCS 3156

      Pages: 298-311

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Timing Attacks against a Parallelized RSA Implementation2004

    • Author(s)
      Yasuyuki Sakai, Kouichi Sakurai
    • Journal Title

      情報処理学会論文誌 Vol.45,No.8

    • Related Report
      2004 Annual Research Report
  • [Presentation] 羃算における直接計算法を用いたマルチスカラー倍算の効率性評価2007

    • Author(s)
      山田尚志, 高木剛, 楼井幸一
    • Organizer
      電子情報通信学会, 情報セキュリティ研究会
    • Place of Presentation
      機械振興会館
    • Year and Date
      2007-12-19
    • Related Report
      2007 Annual Research Report
  • [Remarks]

    • URL

      http://itslab.csce.kyushu-u.ac.jp/

    • Related Report
      2007 Annual Research Report
  • [Remarks]

    • URL

      http://www.fun.ac.jp/?takagi/ja/index.html

    • Related Report
      2007 Annual Research Report

URL: 

Published: 2004-04-01   Modified: 2018-03-28  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi