• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of high-performance public-key cryptographic processors with tamper resistance

Research Project

Project/Area Number 22680003
Research Category

Grant-in-Aid for Young Scientists (A)

Allocation TypeSingle-year Grants
Research Field Computer system/Network
Research InstitutionTohoku University

Principal Investigator

HOMMA Naofumi  東北大学, 情報科学研究科, 准教授 (00343062)

Project Period (FY) 2010-04-01 – 2014-03-31
Project Status Completed (Fiscal Year 2013)
Budget Amount *help
¥13,390,000 (Direct Cost: ¥10,300,000、Indirect Cost: ¥3,090,000)
Fiscal Year 2012: ¥5,460,000 (Direct Cost: ¥4,200,000、Indirect Cost: ¥1,260,000)
Fiscal Year 2011: ¥3,900,000 (Direct Cost: ¥3,000,000、Indirect Cost: ¥900,000)
Fiscal Year 2010: ¥4,030,000 (Direct Cost: ¥3,100,000、Indirect Cost: ¥930,000)
Keywords計算機システム / システムオンチップ / VLSI設計技術 / 暗号プロセッサ / 耐タンパー性
Research Abstract

This research project developed a high-performance cryptographic processor with a state-of-the-art tamper resistance capability and its design methodology. More precisely, we designed a processor architecture specified for exponentiation operation which is an integral part of public-key cryptographic operation, and developed an RSA processor highly resistant to side-channel attacks. In addition, we demonstrated the validity of the developed processor through an exhaustive set of experiments on side-channel attacks (i.e., chosen-message power/EM analysis attacks and fault injection attacks) against a prototype implementation of the developed processor. Moreover, we developed an automatic generator which generates RSA processors depending on various design specifications.

Report

(4 results)
  • 2013 Final Research Report ( PDF )
  • 2012 Annual Research Report
  • 2011 Annual Research Report
  • 2010 Annual Research Report
  • Research Products

    (59 results)

All 2013 2012 2011 2010 Other

All Journal Article (24 results) (of which Peer Reviewed: 24 results) Presentation (29 results) (of which Invited: 8 results) Book (2 results) Remarks (4 results)

  • [Journal Article] Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates2012

    • Author(s)
      Miroslav Knezevic, Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Akashi Satoh, Unal Kocabas, Junfeng Fan, Toshiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, Takafumi Aoki
    • Journal Title

      IEEE Transactions on Very Large Scale Integration Systems

      Volume: Vol.20, No.5 Pages: 827-840

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Formal Approach to Designing Arithmetic Circuits over Galois Fields Using Symbolic Computer Algebra2012

    • Author(s)
      Kazuya Saito, Naofumi Homma, and Takafumi Aoki
    • Journal Title

      Proceedings of the 17th Workshop on Synthesis And System Integration of Mixed Information technologies

      Pages: 153-158

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Formal Approach to Designing Cryptographic Processors Based on GF(2^m) Arithmetic Circuits2012

    • Author(s)
      Naofumi Homma, Kazuya Saito, and Takafumi Aoki
    • Journal Title

      IEEE Transactions on Information Forensics & Security

      Volume: Vol.7, No.1 Pages: 3-13

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] 暗号モジュールに対するサイドチャネル攻撃とその対策技術の研究動向2012

    • Author(s)
      林優一,本間尚文,水木敬明,青木孝文,曽根秀昭
    • Journal Title

      電気学会論文誌 A

      Volume: vol.132(2012), no.1 Pages: 9-12

    • NAID

      10030523586

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates2012

    • Author(s)
      Miroslav Knezevic
    • Journal Title

      IEEE Transactions on Very Large Scale Integration Systems

      Volume: 20 Issue: 5 Pages: 827-840

    • DOI

      10.1109/tvlsi.2011.2128353

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Formal Design of Multiple-Valued Arithmetic Algorithms over Galois Fields and its Application to Cryptographic Processors2012

    • Author(s)
      Naofumi Homma
    • Journal Title

      Proceedings of the 42nd International Symposium on Multiple Valued Logic

      Volume: 1 Pages: 110-115

    • DOI

      10.1109/ismvl.2012.24

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Formal Approach to Designing Cryptographic Processors Based on GF(2^m) Arithmetic Circuits2012

    • Author(s)
      Naofumi Homma, et al
    • Journal Title

      IEEE Transactions on Information Forensics & Security

      Volume: Vol.7No.1 Issue: 1 Pages: 3-13

    • DOI

      10.1109/tifs.2011.2157687

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Formal Approach to Designing Arithmetic Circuits over Galois Fields Using Symbolic Computer Algebra2012

    • Author(s)
      Kazuya Saito, et al
    • Journal Title

      Proceedings of the 17th Workshop on Synthesis And System Integration of Mixed Information technologies

      Volume: No.1 Pages: 153-158

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] High-performance Architecture for Concurrent Error Detection for AES Processors2011

    • Author(s)
      Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: Vol.E94-A, No.10 Pages: 1971-1980

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Systematic design of RSA processors based on high-radix Montgomery multipliers2011

    • Author(s)
      Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh
    • Journal Title

      IEEE Transactions on Very Large Scale Integration Systems

      Volume: Vol.19, No.7 Pages: 1136-1146

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Graph-Based Approach to Designing Multiple-Valued Arithmetic Algorithms2011

    • Author(s)
      Kazuya Saito, Naofumi Homma and Takafumi Aoki
    • Journal Title

      Proceedings of the 41st International Symposium on Multiple Valued Logic

      Pages: 27-32

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Systematic design of RSA processors based on high-radix Montgomery multipliers2011

    • Author(s)
      A. Miyamoto, N. Homma, T. Aoki, and A. Satoh
    • Journal Title

      IEEE Trans. Very Large Scale Integration Systems

      Volume: 19 Issue: 7 Pages: 1136-1146

    • DOI

      10.1109/tvlsi.2010.2049037

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] High-Performance Architecture for Concurrent Error Detection for AES Processors2011

    • Author(s)
      Takeshi Sugawara, et al
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E94-A Issue: 10 Pages: 1971-1980

    • DOI

      10.1587/transfun.E94.A.1971

    • NAID

      10030191161

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A graph-based approach to designing multiple-valued arithmetic algorithms2011

    • Author(s)
      Kazuya Saito, Naofumi Homma, Takafumi Aoki
    • Journal Title

      Proceedings of the 41st International Symposium on Multiple Valued Logic

      Volume: No.1 Pages: 27-32

    • DOI

      10.1109/ismvl.2011.44

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] RSA 暗号プロセッサ自動生成システムの設計と評価2010

    • Author(s)
      馬場祐一, 宮本篤志, 本間尚文, 青木孝文, 佐藤
    • Journal Title

      情報処理学会論文誌

      Volume: Vol.51, No.9 Pages: 1847-1858

    • NAID

      40019543799

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Profiling attack using multivariate regression analysis2010

    • Author(s)
      Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh
    • Journal Title

      IEICE Electronics Express

      Volume: Vol.7, No.15 Pages: 1139-1144

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Multiple-Valued Constant-Power Adder and Its Application to Cryptographic Processor2010

    • Author(s)
      Naofumi Homma, Yuichi Baba, Atsushi Miyamoto, and Takafumi Aoki
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: Vol.E93-D, No.8 Pages: 2117-2125

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Comparative Power Analysis of Modular Exponentiation Algorithms2010

    • Author(s)
      Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, and Adi Shamir
    • Journal Title

      IEEE Transactions on Computers

      Volume: Vol.59, No.6 Pages: 795-807

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Design of tamper-resistant registers for multiple-valued cryptographic processors2010

    • Author(s)
      Yuichi Baba, Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki
    • Journal Title

      Proceedings of the 40th International Symposium on Multiple Valued Logic

      Pages: 67-72

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Comparative Power Analysis of Modular Exponentiation Algorithms2010

    • Author(s)
      Naofumi Homma
    • Journal Title

      IEEE Transactions on Computers

      Volume: Vol.59 No.6 Pages: 795-807

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Design of tamper-resistant registers for multiple-valued cryptographic processors2010

    • Author(s)
      Yuichi Baba
    • Journal Title

      Proceedings of the 40th International Symposium on Multiple Valued Logic

      Pages: 67-72

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Multiple-Valued Constant-Power Adder and Its Application to Cryptographic Processor2010

    • Author(s)
      Naofumi Homma
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: Vol.E93-DNo.8 Pages: 2117-2125

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Profiling attack using multivariate regression analysis2010

    • Author(s)
      Takeshi Sugawara
    • Journal Title

      IEICE Electronics Express

      Volume: Vol.7 No.15 Pages: 1139-1144

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] RSA暗号プロセッサ自動生成システムの設計と評価2010

    • Author(s)
      馬場祐一
    • Journal Title

      情報処理学会論文誌

      Volume: Vol.51 No.9 Pages: 1847-1858

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Presentation] ガロア体上の乗算器モジュールジェネレータの構築2013

    • Author(s)
      岡本広太郎,本間尚文,青木孝文
    • Organizer
      第75回情報処理学会全国大会
    • Place of Presentation
      仙台 (3K-8,1-135-1-136)
    • Year and Date
      2013-03-07
    • Related Report
      2013 Final Research Report
  • [Presentation] Security Evaluation of Cryptographic Systems against Physical Attacks2012

    • Author(s)
      Naofumi Homma
    • Organizer
      2012 Bilateral Workshop between Tohoku University and National Tsing Hua University
    • Place of Presentation
      仙台
    • Year and Date
      2012-12-12
    • Related Report
      2013 Final Research Report
    • Invited
  • [Presentation] 正規基底表現されたガロア体上の算術演算回路の形式的設計に関する検討2012

    • Author(s)
      岡本広太郎, 本間尚文, 青木孝文
    • Organizer
      第35回多値論理フォーラム
    • Place of Presentation
      富山 (No. 7, 7-1-7-6)
    • Year and Date
      2012-09-15
    • Related Report
      2013 Final Research Report
  • [Presentation] Toward Formal Design of Cryptographic Processors Based on Galois Field Arithmetic2012

    • Author(s)
      Naofumi Homma
    • Organizer
      PROOFS (Security Proofs for Embedded Systems) Workshop
    • Place of Presentation
      ルーベン,ベルギー
    • Year and Date
      2012-09-13
    • Related Report
      2013 Final Research Report
    • Invited
  • [Presentation] ガロア体上の算術演算回路の自動生成システムの構築2012

    • Author(s)
      岡本広太郎, 本間尚文, 青木孝文
    • Organizer
      平成24年度 電気関係学会東北支部連合大会
    • Place of Presentation
      本庄 (No. 1I03, 115)
    • Year and Date
      2012-08-30
    • Related Report
      2013 Final Research Report
  • [Presentation] What are going to be the key MVL innovations over the next 10 years?2012

    • Author(s)
      Naofumi Homma
    • Organizer
      Special Panel Session on Upcoming Advances in MVL, the 42nd International Symposium on Multiple-Valued Logic
    • Place of Presentation
      ヴィクトリア,カナダ
    • Year and Date
      2012-05-14
    • Related Report
      2013 Final Research Report
    • Invited
  • [Presentation] ガロア体上の算術演算回路の形式的設計とそのAES 暗号プロセッサへの応用2012

    • Author(s)
      齋藤和也, 本間尚文, 青木孝文
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢 (Vol. 4C1-4, 1-8)
    • Year and Date
      2012-02-02
    • Related Report
      2013 Final Research Report
  • [Presentation] ガロア体上の算術演算回路の形式的設計とそのAES暗号プロセッサへの応用2012

    • Author(s)
      齋藤和也
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢
    • Year and Date
      2012-02-02
    • Related Report
      2011 Annual Research Report
  • [Presentation] ガロア体上の算術演算回路の形式的表現に関する検討2012

    • Author(s)
      齋藤和也, 本間尚文, 青木孝文
    • Organizer
      第25回多値論理とその応用研究会
    • Place of Presentation
      宮崎 (No. 8, 38-44)
    • Year and Date
      2012-01-07
    • Related Report
      2013 Final Research Report
  • [Presentation] ガロア体上の算術演算回路の形式的表現に関する検討2012

    • Author(s)
      齋藤和也
    • Organizer
      第25回多値論理とその応用研究会
    • Place of Presentation
      宮崎
    • Year and Date
      2012-01-07
    • Related Report
      2011 Annual Research Report
  • [Presentation] 算術回路グラフの暗号プロセッサ設計への応用2011

    • Author(s)
      齋藤和也,本間尚文,青木孝文
    • Organizer
      第34回多値論理フォーラム
    • Place of Presentation
      筑波 (No. 11, 11-1-11-6)
    • Year and Date
      2011-09-18
    • Related Report
      2013 Final Research Report
  • [Presentation] 算術回路グラフの暗号プロセッサ設計への応用2011

    • Author(s)
      齋藤和也
    • Organizer
      第34回多値論理フォーラム
    • Place of Presentation
      筑波
    • Year and Date
      2011-09-18
    • Related Report
      2011 Annual Research Report
  • [Presentation] Efficient countermeasure against fault injection attacks on modular2011

    • Author(s)
      Sho Endo, Naofumi Homma and Takafumi Aoki
    • Organizer
      平成23年度 電気関係学会東北支部連合大会
    • Place of Presentation
      多賀城 (No. 1A03, 3)
    • Year and Date
      2011-08-25
    • Related Report
      2013 Final Research Report
  • [Presentation] Efficient countermeasure against fault injection attacks on modular2011

    • Author(s)
      Sho Endo
    • Organizer
      平成23年度電気関係学会東北支部連合大会
    • Place of Presentation
      多賀城
    • Year and Date
      2011-08-25
    • Related Report
      2011 Annual Research Report
  • [Presentation] DPA Contest V3 and SASEBO-W for V42011

    • Author(s)
      Naofumi Homma
    • Organizer
      International Workshop on Constructive Side-Channel Analysis and Secure Design
    • Place of Presentation
      ダルムシュタット,ドイツ
    • Year and Date
      2011-02-24
    • Related Report
      2013 Final Research Report
    • Invited
  • [Presentation] DPA Contest V3 and SASEBO-W for V42011

    • Author(s)
      Naofumi Homma
    • Organizer
      International Workshop on Constructive Side-Channel Analysis and Secure Design
    • Place of Presentation
      ダルムシュタット、ドイツ
    • Year and Date
      2011-02-24
    • Related Report
      2010 Annual Research Report
  • [Presentation] 算術回路グラフに基づく算術演算回路の形式的設計に関する検討2011

    • Author(s)
      齋藤和也, 本間尚文, 青木孝文
    • Organizer
      第24回多値論理とその応用研究会
    • Place of Presentation
      仙台 (No. 8, 8-1-8-6)
    • Year and Date
      2011-01-08
    • Related Report
      2013 Final Research Report
  • [Presentation] 算術回路グラフに基づく算術演算回路の形式的設計に関する検討2011

    • Author(s)
      齋藤和也
    • Organizer
      第24回多値論理とその応用研究会
    • Place of Presentation
      仙台
    • Year and Date
      2011-01-08
    • Related Report
      2010 Annual Research Report
  • [Presentation] 多値算術演算回路向け算術アルゴリズムの形式的表現と検証に関する検討2010

    • Author(s)
      齋藤和也
    • Organizer
      第33回多値論理フォーラム
    • Place of Presentation
      広島
    • Year and Date
      2010-09-11
    • Related Report
      2010 Annual Research Report
  • [Presentation] 楕円曲線暗号ハードウェアの電力解析による安全性評価2010

    • Author(s)
      齋藤和也
    • Organizer
      平成22年度電気関係学会東北支部連合大会
    • Place of Presentation
      八戸
    • Year and Date
      2010-08-26
    • Related Report
      2010 Annual Research Report
  • [Presentation] 暗号LSI の設計技術2010

    • Author(s)
      本間尚文
    • Organizer
      日本学術振興会 シリコン超集積化システム第165委員会
    • Place of Presentation
      東京
    • Year and Date
      2010-04-16
    • Related Report
      2013 Final Research Report
    • Invited
  • [Presentation] 多値算術演算回路向け算術アルゴリズムの形式的表現と検証に関する検討2010

    • Author(s)
      齋藤和也, 本間尚文, 青木孝文
    • Organizer
      第33回多値論理フォーラム
    • Place of Presentation
      広島 (No. 8, 8-1-8-6)
    • Related Report
      2013 Final Research Report
  • [Presentation] 楕円曲線暗号ハードウェアの電力解析による安全性評価2010

    • Author(s)
      齋藤和也, 菅原健, 本間尚文, 青木孝文, 佐藤証
    • Organizer
      平成22年度 電気関係学会東北支部連合大会
    • Place of Presentation
      八戸 (No. 1E08, 143)
    • Related Report
      2013 Final Research Report
  • [Presentation] What are going to be the key MVL innovations over the next 10 years?

    • Author(s)
      Naofumi Homma
    • Organizer
      The 42nd International Symposium on Multiple-Valued Logic
    • Place of Presentation
      Victoria, Canada
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] Toward Formal Design of Cryptographic Processors Based on Galois Field Arithmetic

    • Author(s)
      Naofumi Homma
    • Organizer
      PROOFS (Security Proofs for Embedded Systems) Workshop
    • Place of Presentation
      Leuven, Belgium
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] Security Evaluation of Cryptographic Systems against Physical Attacks

    • Author(s)
      Naofumi Homma
    • Organizer
      2012 Bilateral Workshop between Tohoku University and National Tsing Hua University
    • Place of Presentation
      Sendai, Japan
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] ガロア体上の算術演算回路の自動生成システムの構築

    • Author(s)
      岡本広太郎
    • Organizer
      平成24年度 電気関係学会東北支部連合大会
    • Place of Presentation
      本庄,日本
    • Related Report
      2012 Annual Research Report
  • [Presentation] 正規基底表現されたガロア体上の算術演算回路の形式的設計に関する検討

    • Author(s)
      岡本広太郎
    • Organizer
      第35回多値論理フォーラム
    • Place of Presentation
      富山,日本
    • Related Report
      2012 Annual Research Report
  • [Presentation] ガロア体上の乗算器モジュールジェネレータの構築

    • Author(s)
      岡本広太郎
    • Organizer
      第75回情報処理学会全国大会
    • Place of Presentation
      仙台,日本
    • Related Report
      2012 Annual Research Report
  • [Book] サイドチャネル攻撃 (映像情報メディア学会誌,Vol.64, No.11)2010

    • Author(s)
      本間尚文,青木孝文
    • Publisher
      映像情報メディア学会
    • Related Report
      2013 Final Research Report
  • [Book] サイドチャネル攻撃,映像情報メディア学会誌2010

    • Author(s)
      本間尚文
    • Publisher
      映像情報メディア学会
    • Related Report
      2010 Annual Research Report
  • [Remarks]

    • URL

      http://www.aoki.ecei.tohoku.ac.jp/arith/mg/index.html

    • Related Report
      2013 Final Research Report
  • [Remarks] 算術演算モジュールジェネレータ

    • URL

      http://www.aoki.ecei.tohoku.ac.jp/arith/mg/index.html

    • Related Report
      2012 Annual Research Report
  • [Remarks]

    • URL

      http://www.aoki.ecei.tohoku.ac.jp/arith/mg/index.html

    • Related Report
      2011 Annual Research Report
  • [Remarks]

    • URL

      http://www.aoki.ecei.tohoku.ac.jp/arith/mg/index.html

    • Related Report
      2010 Annual Research Report

URL: 

Published: 2010-08-23   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi