• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

A research on design theory of cryptographic protocols for resource constraint devices with considering implementation efficiency

Research Project

Project/Area Number 24500027
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Fundamental theory of informatics
Research InstitutionNational Institute of Information and Communications Technology

Principal Investigator

MATSUO Shin'ichiro  独立行政法人情報通信研究機構, 社会還元促進部門, 統括 (20553960)

Co-Investigator(Kenkyū-buntansha) MORIYAMA Daisuke  独立行政法人情報通信研究機構, ネットワークセキュリティ研究所セキュリティアーキテクチャ研究室, 研究員 (10613987)
SAKIYAMA Kazuo  電気通信大学, 大学院情報理工学研究科, 教授 (80508838)
Project Period (FY) 2012-04-01 – 2015-03-31
Project Status Completed (Fiscal Year 2014)
Budget Amount *help
¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Fiscal Year 2014: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2013: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2012: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywords暗号プロトコル / 暗号技術 / 省リソースデバイス / 暗号実装
Outline of Final Research Achievements

In this research, we conducted researches on design and implementation of feasible and security proven light-weight cryptographic protocols for low-power devices for authentication and secure communications. This protocol will be used in the devices which do not have enough memory and computational power like PC and servers, thus the existing cryptographic protocols can not be be executed. As results of this research, we designed cryptographic protocols using PUF, which is the difference of actual devices caused by production process, and then prove the security of the protocol from statistic analysis. We also evaluated efficiency in hardware implementation of RFID authentication protocols and show the technical estimations toward practical use.

Report

(4 results)
  • 2014 Annual Research Report   Final Research Report ( PDF )
  • 2013 Research-status Report
  • 2012 Research-status Report
  • Research Products

    (4 results)

All 2014 2013

All Presentation (4 results)

  • [Presentation] Provably Secure Two-Round RFID Grouping Proof Protocols2014

    • Author(s)
      Daisuke Moriyama
    • Organizer
      RFID-TA 2014
    • Place of Presentation
      Tampere, Finland
    • Year and Date
      2014-09-08 – 2014-09-09
    • Related Report
      2014 Annual Research Report
  • [Presentation] サイドチャネル認証に向けた基礎的考察2014

    • Author(s)
      松原有沙, 李陽, 林優一, 崎山一男
    • Organizer
      電子情報通信学会 ISEC研究会
    • Place of Presentation
      サン・リフレ函館, 北海道, 函館市
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] メモリ漏洩に対して安全性とプライバシーを満たすPUFベースRFID認証プロトコル2014

    • Author(s)
      森山大輔、松尾真一郎、Moti Yung
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS)2014
    • Place of Presentation
      城山観光ホテル・鹿児島県鹿児島市
    • Related Report
      2013 Research-status Report
  • [Presentation] 巡回シフトを用いたPUFに基づくパターン照合鍵生成システムの実装評価2013

    • Author(s)
      岩井祐樹、福島崇文、森山大輔、松尾真一郎、駒野雄一、岩本貢、太田和夫、崎山一男
    • Organizer
      暗号と情報セキュリティシンポジウム2013
    • Place of Presentation
      ウエスティ都ホテル京都、京都府
    • Related Report
      2012 Research-status Report

URL: 

Published: 2013-05-31   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi