Efficiency Analysis of Arithmetic for Public-Key Cryptosystems and its Applications
Project/Area Number |
18500015
|
Research Category |
Grant-in-Aid for Scientific Research (C)
|
Allocation Type | Single-year Grants |
Section | 一般 |
Research Field |
Fundamental theory of informatics
|
Research Institution | Future University-Hakodate |
Principal Investigator |
TAKAGI Tsuyoshi Future University-Hakodate, School of Systems Information Srience, Associate Professor (60404802)
|
Project Period (FY) |
2006 – 2007
|
Project Status |
Completed (Fiscal Year 2007)
|
Budget Amount *help |
¥3,950,000 (Direct Cost: ¥3,500,000、Indirect Cost: ¥450,000)
Fiscal Year 2007: ¥1,950,000 (Direct Cost: ¥1,500,000、Indirect Cost: ¥450,000)
Fiscal Year 2006: ¥2,000,000 (Direct Cost: ¥2,000,000)
|
Keywords | Information Security / Cryptography / Algorithm / Network Security / Efficient Implementation / アリゴリズム / アルゴリズム |
Research Abstract |
We have investigated the following research topics. (1) For a countermeasure against side channel attacks on Koblitz curve cryptosystem, we proposed a tau expansion with a fixed pattern for a give element in an imaginary quadratic filed. (2) A secret bit of a scalar multiplication in PKC corresponds to either a multiplication or a squaring. We experimented that a multiplication with two same input has a different power consumption. (3) XTR is one of the most efficient public-key cryptosystems. We presented an algorithm that computes an exponentiation with a fixed pattern secure against side channel attacks. (4) RSA-CRT is an efficient method to enhance the speed of RSA cryptosystem. We gave a survey of RSA-CRT and some countermeasures against side channel attacks. (5) The final exponentiation of pairing on supersingular elliptic curve over finite field with characteristic three was improved by 50% using the torus over GF (3^m). E(6) CDSA requires a multi-scalar multiplication in the verification step. In this research we presented a minimal joint Hamming weight class for a window method using Shamir's trick. (7) We proposed a variant of XTR over GF (3^6m) whose ciphertexts can be compressed by 1/6. We also presented an efficient implementation using the optimal normal basis (ONB). (8) We have presented an efficient representation of scalar by the Frobenius map of Koblitz curve, which is able to reduce the number of pre-computed table only to two in TNAF5. (9) We proposed an efficient implementation of EtaT pairing using the random coordinate secure against side channel attacks. (10) We published a proceedings of the first conference on pairing-based cryptography "Pairing 2007", which deals basic mathematics, cryptographic protocols, implementation, and applied security, related to pairing.
|
Report
(3 results)
Research Products
(32 results)
-
-
-
-
[Journal Article] Power Analysis Attacks and Countermeasures on riT Pairing over Binary Fields2008
Author(s)
Tae, Hyun, Kim, Tsuyoshi, Takagi, Dong Guk, Han, Ho Won, Kim, Jong in, Lim
-
Journal Title
ETRI Journal, Electronics and I Telecommunications Research Institute Vol. 30, No. 1
Pages: 68-80
Description
「研究成果報告書概要(欧文)」より
Related Report
-
-
-
-
[Journal Article] Compressed XTR2007
Author(s)
Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi
-
Journal Title
The 5th International Conference on Applied Cryptography and Network Security, ACNS 2007 LNCS4521
Pages: 420-431
Description
「研究成果報告書概要(和文)」より
Related Report
Peer Reviewed
-
-
-
[Journal Article] Compressed XTR2007
Author(s)
Masaaki, Shirase, Dong-Guk, Han, Yasushi, Hibino, Ho Won, Kim, Tsuyoshi, Takagi
-
Journal Title
5th International Conference on Applied Cryptography and Network Security, ACNS 2007, LNCS 4521, Springer-Verlag
Pages: 420-431
Description
「研究成果報告書概要(欧文)」より
Related Report
-
[Journal Article] Pairing-Based Cryptography-Pairing 20072007
Author(s)
Tsuyoshi, Takagi, Tatsuaki, Okamoto, Eiji, Okamoto, Takeshi, Okamoto
-
Journal Title
First International Conference Tokyo, Japan, July 2-4, 2007 4575
Description
「研究成果報告書概要(欧文)」より
Related Report
-
-
[Journal Article] Compressed XTR2007
Author(s)
Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi
-
Journal Title
The 5th International Conference on Applied Cryptography and Network Security, ACNS 2007 LNCS 4521
Pages: 420-431
Related Report
Peer Reviewed
-
-
-
-
-
-
-
-
-
[Journal Article] Further Security Analysis of XTR2006
Author(s)
Dong-Guk, Han, Tsuyoshi, Takagi, Jongin, Lim
-
Journal Title
The 2nd Information Security Practice and Experience Conference, ISPEC 2006, LNCS 3903, Springer-Verlag
Pages: 33-44
Description
「研究成果報告書概要(欧文)」より
Related Report
-
-
-
-
-
-
-
-
-