• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of high-level design methodology for security hardware based on redundant Galois-field arithmetic

Research Project

Project/Area Number 17H00729
Research Category

Grant-in-Aid for Scientific Research (A)

Allocation TypeSingle-year Grants
Section一般
Research Field Computer system
Research InstitutionTohoku University

Principal Investigator

Homma Naofumi  東北大学, 電気通信研究所, 教授 (00343062)

Project Period (FY) 2017-04-01 – 2021-03-31
Project Status Completed (Fiscal Year 2020)
Budget Amount *help
¥42,510,000 (Direct Cost: ¥32,700,000、Indirect Cost: ¥9,810,000)
Fiscal Year 2020: ¥10,140,000 (Direct Cost: ¥7,800,000、Indirect Cost: ¥2,340,000)
Fiscal Year 2019: ¥12,350,000 (Direct Cost: ¥9,500,000、Indirect Cost: ¥2,850,000)
Fiscal Year 2018: ¥11,700,000 (Direct Cost: ¥9,000,000、Indirect Cost: ¥2,700,000)
Fiscal Year 2017: ¥8,320,000 (Direct Cost: ¥6,400,000、Indirect Cost: ¥1,920,000)
Keywords計算機システム / ハードウェアセキュリティ / LSI設計技術
Outline of Final Research Achievements

In this research project, we have developed a design technology for the Galois-field arithmetic data path, which is the basis of cryptographic and error correction LSIs. First, (1) a formal design method for high-order arithmetic data paths based on redundant Galois field representations, such as polynomial ring representation and redundant representation basis, was developed, and (2) a formal verification method based on computer algebra applicable to the circuit representation was developed. We have then applied the formal design and verification method to the cryptographic processor data path as its application. In particular, we have designed and verified efficient and/or tamper-resistant processor data paths for the ISO / IEC international standard ciphers. Furthermore, (4) we have developed an automatic synthesis / verification system for higher-order Galois-field arithmetic data paths.

Academic Significance and Societal Importance of the Research Achievements

ガロア体上の算術演算回路は,これまで設計者により経験的に設計されており,その検証に膨大な時間を必要としてきた.特に,実用的な暗号や誤り訂正回路の設計では,項数が100を越える長大なAND-XOR論理式が必要となり,シミュレーション用のテストベンチ作成も非直観的で困難であった.これに対して本研究では,新たな形式的表現を発案するとともに,グレブナー基底などの計算機代数の技法を駆使した形式的検証手法を開発した.これにより,従来困難だった規模の回路の完全な検証に実用的な時間で成功した.

Report

(5 results)
  • 2020 Annual Research Report   Final Research Report ( PDF )
  • 2019 Annual Research Report
  • 2018 Annual Research Report
  • 2017 Annual Research Report
  • Research Products

    (56 results)

All 2021 2020 2019 2018 2017 Other

All Int'l Joint Research (3 results) Journal Article (24 results) (of which Int'l Joint Research: 1 results,  Peer Reviewed: 24 results,  Open Access: 9 results) Presentation (27 results) (of which Int'l Joint Research: 6 results,  Invited: 9 results) Book (1 results) Remarks (1 results)

  • [Int'l Joint Research] Nanyang Technological University(シンガポール)

    • Related Report
      2020 Annual Research Report
  • [Int'l Joint Research] Telecom Paris(フランス)

    • Related Report
      2020 Annual Research Report
  • [Int'l Joint Research] Telecom ParisTech(France)

    • Related Report
      2017 Annual Research Report
  • [Journal Article] Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes2021

    • Author(s)
      Ueno Rei、Fukushima Kazuhide、Nakano Yuto、Kiyomoto Shinsaku、Homma Naofumi
    • Journal Title

      Constructive Side-Channel Analysis and Secure Design

      Volume: 12244 Pages: 43-67

    • DOI

      10.1007/978-3-030-68773-1_3

    • ISBN
      9783030687724, 9783030687731
    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] High Throughput/Gate AES Hardware Architectures Based on Datapath Compression2020

    • Author(s)
      Ueno Rei、Homma Naofumi、Morioka Sumio、Miura Noriyuki、Matsuda Kohei、Nagata Makoto、Bhasin Shivam、Mathieu Yves、Graba Tarik、Danger Jean-Luc
    • Journal Title

      IEEE Transactions on Computers

      Volume: 69 Issue: 4 Pages: 534-548

    • DOI

      10.1109/tc.2019.2957355

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] A method for constructing sliding windows leak from noisy cache timing information2020

    • Author(s)
      Ueno Rei、Takahashi Junko、Hayashi Yu-ichi、Homma Naofumi
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: - Issue: 2 Pages: 1-10

    • DOI

      10.1007/s13389-020-00230-x

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Unified Hardware for High-Throughput AES-Based Authenticated Encryptions2020

    • Author(s)
      Sawataishi Shotaro、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE Transactions on Circuits and Systems II: Express Briefs

      Volume: 67 Issue: 9 Pages: 1604-1608

    • DOI

      10.1109/tcsii.2020.3013415

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs2020

    • Author(s)
      Ueno Rei、 Kazumori Kohei、 Homma Naofumi
    • Journal Title

      IACR Transactions on Cryptographic Hardware and Embedded Systems

      Volume: 2020 Pages: 86-128

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Effective Formal Verification for Galois-field Arithmetic Circuits with Multiple-Valued Characteristics2020

    • Author(s)
      Ito Akira、Ueno Rei、Homma Naofumi
    • Journal Title

      IEEE 50th International Symposium on Multiple-Valued Logic

      Volume: 1 Pages: 46-51

    • DOI

      10.1109/ismvl49045.2020.00-31

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Debiasing Method for Efficient Ternary Fuzzy Extractors and Ternary Physically Unclonable Functions2020

    • Author(s)
      Kazumori Kohei、Ueno Rei、Homma Naofumi
    • Journal Title

      Proceedings of International Symposium on Multiple-Value Logic

      Volume: - Pages: 52-57

    • DOI

      10.1109/ismvl49045.2020.00-30

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA2019

    • Author(s)
      Rei Ueno, Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma
    • Journal Title

      Proceedings of 8th International Workshop on Security Proofs for Embedded Systems

      Volume: 11 Pages: 64-77

    • DOI

      10.29007/ws8z

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Statistical Test Methodology for Evaluating Electromagmetic Information Leakage from Mobile Touchscreen Devices2019

    • Author(s)
      Ville Yli-Maeyry, Daisuke Miyata, Naofumi Homma, Yuichi Hayashi, Takafumi Aoki,
    • Journal Title

      IEEE Transactions on Electromagnetic Compatibility

      Volume: 61 Issue: 4 Pages: 1107-1114

    • DOI

      10.1109/temc.2018.2866553

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Tackling Biased PUFs Through Biased Masking: A Debiasing Method for Efficient Fuzzy Extractor2019

    • Author(s)
      Rei Ueno, Manami Suzuki, Naofumi Homma
    • Journal Title

      IEEE Transactions on Computers

      Volume: 68 Issue: 7 Pages: 1091-1104

    • DOI

      10.1109/tc.2019.2897996

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Highly Efficient GF(2^8) Inversion Circuit Based on Hybrid GF Representations2019

    • Author(s)
      Rei Ueno, Naofumi Homma, Yasuyuki Nogami, Takafumi Aoki
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: 9 Issue: 2 Pages: 101-113

    • DOI

      10.1007/s13389-018-0187-8

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] High Throughput/Gate FN-Based Hardware Architectures for AES-OTR2019

    • Author(s)
      Rei Ueno, Naofumi Homma, Tomonori Iida, Kazuhiko Minematsu
    • Journal Title

      IEEE International Symposium on Circuits and Systems

      Volume: 1 Pages: 1-4

    • DOI

      10.1109/iscas.2019.8702231

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Ternary Fuzzy Extractor for Efficient Cryptographic Key Generation2019

    • Author(s)
      Kohei Kazumori, Rei Ueno, Naofumi Homma
    • Journal Title

      IEEE 49th International Symposium on Multiple-Valued Logic

      Volume: 1 Pages: 49-54

    • DOI

      10.1109/ismvl.2019.00017

    • Related Report
      2019 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Fuzzy Extractors Based on Ternary Debiasing Method for Biased Physically Unclonable Functions2019

    • Author(s)
      Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      IEEE Transactions on Circuits and Systems I: Regular Papers

      Volume: 66 Issue: 2 Pages: 616-629

    • DOI

      10.1109/tcsi.2018.2869086

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Characterizing Parallel Multipliers for Detecting Hardware Trojans2018

    • Author(s)
      Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      Journal of Applied Logics

      Volume: 5 Pages: 1815-1831

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On the Detectability of Hardware Trojans Embedded in Parallel Multipliers2018

    • Author(s)
      Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      IEEE 48th International Symposium on Multiple-Valued Logic

      Volume: 1 Pages: 62-67

    • DOI

      10.1109/ismvl.2018.00019

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Quaternary Debiasing for Physically Unclonable Functions2018

    • Author(s)
      Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      IEEE 48th International Symposium on Multiple-Valued Logic

      Volume: 1 Pages: 7-12

    • DOI

      10.1109/ismvl.2018.00010

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis2018

    • Author(s)
      Kazuhiro Oshida, Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      International Workshop on Constructive Side-Channel Analysis and Secure Design 2018

      Volume: 1 Pages: 44-60

    • DOI

      10.1007/978-3-319-89641-0_3

    • ISBN
      9783319896403, 9783319896410
    • Related Report
      2018 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Highly Efficient GF(2^8) Inversion CIrcuit Based on Hybrid GF Representations2018

    • Author(s)
      Rei Ueno, Naofumi Homma, Yasuyuki Nogami, Takafumi Aoki
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: 1 Pages: 1-13

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Automatic Generation System for Multiple-Valued Galois-Field Parallel Multipliers2017

    • Author(s)
      Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E100.D Issue: 8 Pages: 1603-1610

    • DOI

      10.1587/transinf.2016LOP0010

    • NAID

      130005876144

    • ISSN
      0916-8532, 1745-1361
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Hierarchical Formal Verification Combining Algebraic Transformation with PPRM Expansion and Its Application to Masked Cryptographic Processors2017

    • Author(s)
      Rei Ueno, Naofumi Homma, Takafumi Aoki, Sumio Morioka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E100.A Issue: 7 Pages: 1396-1408

    • DOI

      10.1587/transfun.E100.A.1396

    • NAID

      130007311794

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Systematic Design of Tamper-Resistant Galois-Field Arithmetic Circuits Based on Threshold Implementation with (d+1) Input Share2017

    • Author(s)
      Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      IEEE 47th International Symposium on Multiple-Valued Logic (ISMVL)

      Volume: 1 Pages: 136-141

    • DOI

      10.1109/ismvl.2017.35

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Toward More Efficient Tamper-Resistant AES Hardware Architecture Based on Threshold Implementation2017

    • Author(s)
      Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2017)

      Volume: 10348 Pages: 50-64

    • DOI

      10.1007/978-3-319-64647-3_4

    • ISBN
      9783319646466, 9783319646473
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors2017

    • Author(s)
      Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki
    • Journal Title

      International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2017)

      Volume: 10348 Pages: 248-263

    • DOI

      10.1007/978-3-319-64647-3_15

    • ISBN
      9783319646466, 9783319646473
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Presentation] 線形写像の最適化による高効率AES S-Boxハードウェアの設計と評価2021

    • Author(s)
      中嶋彩乃
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2020 Annual Research Report
  • [Presentation] 決定グラフ表現に基づくハードウェアトロイ検知手法2020

    • Author(s)
      伊東 燦
    • Organizer
      第43回多値論理フォーラム
    • Related Report
      2020 Annual Research Report
  • [Presentation] 多標数ガロア体算術演算回路の形式的検証手法2020

    • Author(s)
      伊東燦, 上野嶺, 本間尚文
    • Organizer
      第33回多値論理とその応用研究会
    • Related Report
      2019 Annual Research Report
  • [Presentation] 暗号ハードウェアに対する形式的ハードウェアトロイ検出手法2020

    • Author(s)
      伊東燦, 上野嶺, 本間尚文
    • Organizer
      2020年暗号と情報セキュリティシンポジウム
    • Related Report
      2019 Annual Research Report
  • [Presentation] BBB安全なインクリメンタルMACスキームとそのハードウェア実装2020

    • Author(s)
      小田麻矢, 上野嶺, 井上明子, 峯松一彦, 本間尚文
    • Organizer
      2020年暗号と情報セキュリティシンポジウム
    • Related Report
      2019 Annual Research Report
  • [Presentation] PUFからの棄却サンプリングを用いた効率的な暗号鍵生成2020

    • Author(s)
      数森康平, 上野嶺, 本間尚文
    • Organizer
      2020年暗号と情報セキュリティシンポジウム
    • Related Report
      2019 Annual Research Report
  • [Presentation] Designing Secure Cryptographic Circuits2019

    • Author(s)
      Naofumi Homma
    • Organizer
      2019 IEEE International Electron Devices Meeting
    • Related Report
      2019 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] ハードウェアセキュリティ技術とその展望2019

    • Author(s)
      本間尚文
    • Organizer
      第110回ニューパラダイムコンピューティング研究会
    • Related Report
      2019 Annual Research Report
    • Invited
  • [Presentation] Circuit Design Resistant to Side Channel Attacks2019

    • Author(s)
      Naofumi Homma
    • Organizer
      2019 Symposium on VLSI Circuits
    • Related Report
      2019 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] ガロア体演算に基づく認証暗号の統合ハードウェアの設計,2019

    • Author(s)
      澤田石尚太郎, 上野嶺, 本間尚文
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2019 Annual Research Report
  • [Presentation] ガロア体演算に基づく暗号ハードウェアにおけるHT検知技術2019

    • Author(s)
      伊東燦, 上野嶺, 本間尚文
    • Organizer
      LSIとシステムのワークショップ
    • Related Report
      2019 Annual Research Report
  • [Presentation] 乗法的オフセットに基づく高効率AESハードウェアアーキテクチャの設計2019

    • Author(s)
      上野嶺, 森岡澄夫, 三浦典之, 松田航平, 永田真, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, 本間尚文
    • Organizer
      セキュリティサマーサミット2019
    • Related Report
      2019 Annual Research Report
  • [Presentation] ガロア体算術に基づく暗号ハードウェアの形式的トロイフリー検証2019

    • Author(s)
      伊東燦, 上野嶺, 本間尚文
    • Organizer
      セキュリティサマーサミット2019
    • Related Report
      2019 Annual Research Report
  • [Presentation] ブール多項式のZDD表現を用いたガロア体算術演算回路の形式的検証手法2019

    • Author(s)
      伊東燦, 上野嶺, 本間尚文
    • Organizer
      第42回多値論理フォーラム
    • Related Report
      2019 Annual Research Report
  • [Presentation] 3値PUFに対する効率的なエントロピー抽出手法とその評価2019

    • Author(s)
      数森康平, 上野嶺, 本間尚文
    • Organizer
      第42回多値論理フォーラム
    • Related Report
      2019 Annual Research Report
  • [Presentation] 低遅延暗号における中間ラウンドからのサイドチャネル漏えいとそのRSMに基づく効率的な対策2019

    • Author(s)
      Ville Yli-Maeyry, 上野嶺, 本間尚文, 青木孝文, 三浦典之, 松田航平, 永田真, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger
    • Organizer
      2019年暗号と情報セキュリティシンポジウム
    • Related Report
      2018 Annual Research Report
  • [Presentation] ガロア体ハードウェアアルゴリズムの形式的トロイフリー性検証手法2019

    • Author(s)
      伊東燦, 上野嶺, 本間尚文, 青木孝文
    • Organizer
      2019年暗号と情報セキュリティシンポジウム
    • Related Report
      2018 Annual Research Report
  • [Presentation] Recent Topics on Cryptographic Hardware Design2018

    • Author(s)
      Naofumi Homma
    • Organizer
      National Tsing Hua University Seminar
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Side-Channel-Aware LSI Design2018

    • Author(s)
      Naofumi Homma
    • Organizer
      2018 International Symposium on VLSI -Design, Automation and Test
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] 耐タンパー性暗号LSIの設計技術2018

    • Author(s)
      本間尚文
    • Organizer
      LSIとシステムのワークショップ
    • Related Report
      2018 Annual Research Report
    • Invited
  • [Presentation] Hardware Security: Emerging Research Field in IoT Era2018

    • Author(s)
      Naofumi Homma
    • Organizer
      The 13th International Workshop on Security
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] Hardware Security: Research Field Expanding in IoT Era2018

    • Author(s)
      Naofumi Homma
    • Organizer
      14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] AES-OTRハードウェアアーキテクチャとその評価2018

    • Author(s)
      上野嶺, 本間尚文, 飯田伴則, 峯松一彦
    • Organizer
      ハードウェアセキュリティ研究会
    • Related Report
      2018 Annual Research Report
  • [Presentation] バイアスを含むPUFに対する高効率な4値デバイアシング2018

    • Author(s)
      鈴木 麻奈美
    • Organizer
      2018年暗号と情報セキュリティシンポジウム
    • Related Report
      2017 Annual Research Report
  • [Presentation] 偏位マスキングに基づくファジー抽出器の構成2018

    • Author(s)
      上野 嶺
    • Organizer
      2018年暗号と情報セキュリティシンポジウム
    • Related Report
      2017 Annual Research Report
  • [Presentation] 乱数オーバーヘッドを抑制した耐タンパー性AES暗号ハードウェア2018

    • Author(s)
      上野 嶺
    • Organizer
      2018年暗号と情報セキュリティシンポジウム
    • Related Report
      2017 Annual Research Report
  • [Presentation] IoT時代の情報セキュリティ技術2018

    • Author(s)
      本間 尚文
    • Organizer
      みやぎ高度電子機械産業振興協議会・エレクトロニクス実装学会セミナー
    • Related Report
      2017 Annual Research Report
    • Invited
  • [Book] Cryptographic Hardware and Embedded Systems - CHES 20172017

    • Author(s)
      Wieland Fischer, Naofumi Homma
    • Publisher
      Springer International Publishing
    • ISBN
      9783319667874
    • Related Report
      2017 Annual Research Report
  • [Remarks] 東北大学電気通信研究所環境調和型セキュア情報システム研究分野

    • URL

      http://www.ecsis.riec.tohoku.ac.jp/

    • Related Report
      2020 Annual Research Report 2019 Annual Research Report 2018 Annual Research Report 2017 Annual Research Report

URL: 

Published: 2017-04-28   Modified: 2022-01-27  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi