• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Studies on High-Speed Encryption-/Signature-Schemes Based on Obscure Representations

Research Project

Project/Area Number 60460128
Research Category

Grant-in-Aid for General Scientific Research (B)

Allocation TypeSingle-year Grants
Research Field 電子通信系統工学
Research InstitutionYokohama National University

Principal Investigator

IMAI Hideki  Faculty of Engineering, Yokohama National University, 工学部, 教授 (70017987)

Co-Investigator(Kenkyū-buntansha) NAKAGAWA Hiroshi  Faculty of Engineering, Yokohama National University, 工学部, 助教授 (20134893)
Project Period (FY) 1985 – 1986
Project Status Completed (Fiscal Year 1986)
Budget Amount *help
¥7,000,000 (Direct Cost: ¥7,000,000)
Fiscal Year 1986: ¥4,100,000 (Direct Cost: ¥4,100,000)
Fiscal Year 1985: ¥2,900,000 (Direct Cost: ¥2,900,000)
KeywordsPublic key cryptosystems / Public key signature systems / Multivariate-polynomial-tuple asymmetric cryptosystems / Occam / Transputer / Obscure representation / Algorithm composition method / 暗号装置
Research Abstract

This project was performed during the 1985-1986 fiscal years for developing and realizing a high-speed encryption/signature system. We have obtained the following results:
1) We have proposed a novel asymmetric cryptosystem C(m,n), which is a kind of asymmetric bijective cryptosystems and has multivariate-polynomial-tuples as its public keys. The system C(m,n) is constructed by the "algorithm composition method" born from our deep study on the "obscure representations" of functions. One of the greatest advantages is its processing speed. This comes from the fact that its structure is suitable for highly parallel processing. The security of C(m,n) is essentially determined by the difficulty of solving a system of multivariate algebraic equations corresponding to its public key.
2) We have developed a set of algorithms for C(m,n) using several techniques including the normal basis multiplier, pipeline and array architectures. The algorithms are described in occam2, a programming language oriented to parallel processing.
3) By some experiments of implementing these algorithms on a machine consists of 10 transputers, we have confirmed the high-speed nature of C(m,n). Here, a transputer is a general-purpose 32-bit microprocessor having four communication links to others. In a 527-bit block cryptosystem C(31,17), our experiments shows that the public- [secret-, resp.] transformation runs about 8.1 kbps [4.6 kbps, resp.].
4) Finally, by evaluating the above theoretical and experimental experiences, we have proposed some essential requirements for the practical realization of C(m,n). In particular, we have designed a hardware architecture which can be expected to achieve around 1 Mbps with relatively small scale hardware.

Report

(1 results)
  • 1986 Final Research Report Summary
  • Research Products

    (18 results)

All Other

All Publications (18 results)

  • [Publications] 今井秀樹: テレビジョン学会誌. 39-12. 1140-1147 (1985)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Hideki Iwai: Proceedings of the 3rd International Conference on Applied Algebra,Algebraic Algorithms and Symbolic Computation,Error Corrocting Codes(Grenoble). (1985)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] 松本勉: 電子通信学会技術研究報告(CS85-28). 85-77. 39-46 (1985)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] 松本勉: 電子通信学会技術研究報告(IT85-88又はAL85-82). 85-318. 55-60 (1986)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] 松本勉: 1986年暗号と情報セキュリティシンポジウム資料E2. (1986)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Tsutomu Matsumoto: Proceedings of A.A.E.C.C.-4.

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] 松本勉: 電子情報通信学会論文誌(投稿予定).

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] 松本勉: 電子通信学会技術研究報告(IT86-6). 86-29. 29-33 (1986)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] 松本勉: 昭和61年電気・情報関連学会連合大会講演論文集. 5. 5-8 (1986)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Hideki IMAI: "Cryptography" The Journal of The Institute of Television Engineers of Japan. 39-12. 1140-1147 (1985)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Hideki IMAI: "Algebraic Methods for Constructing Asymmetric Cryptosystems" Proceedings of the 3rd International Conference on Applied Algebra, Algebraic Algorithms and Symbolic Computation, Error Correcting Codes (Grenoble). (1985)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Tsutomu MATSUMOTO: "Asymmetric Cryptosystems Based on Obscure Representations over Finite Non-Commutative Groups" Paper of Technical Group, TGCS85-28, The Institute of Electronics and Communication Engineers of Japan. 85-77. 39-46 (1985)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Tsutomu MATSUMOTO: "On Multivariate-Polynomial-Tuple Asymmetric Cryptosystems" Paper of Technical Group, TGIT85-88 (or TGAL85-82), The Institute of Electronics and Communication Engineers of Japan. 85-318. 55-60 (1986)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Tsutomu MATSUMOTO: "A Theory of Constructing Multivariate-Polynomial-Tuple Asymmetric Cryptosystems" The Prceedings of The 1986 Symposium on Cryptography and Information Security. (1986)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Tsutomu MATSUMOTO: "On a Multivariate-Polynomial-Tuple Asymmetric Cryptosystem Defined over Large Finite Fields of Characteristic Two" Proceedings of the 4th International Conference on Applied Algebra, Algebraic Algorithms and Symbolic Computation, Error Correcting Codes (to be appeared).

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Tsutomu MATSUMOTO: "Transputer Crypto-Device For Multivariate-Polynomial-Tuple Asymmetric Cryptosystems" The Transactions of The Institute of Electronics and Communication Engineers of Japan.

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Tsutomu MATSUMOTO: "On the Security of Multivariate-Polynomial-Tuple Asymmetric Cryptosystems [preliminary version]" Paper of Technical Group, TGIT86-6, The Institute of Electronics and Communication Engineers of Japan. 86-29. 29-33 (1986)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1986 Final Research Report Summary
  • [Publications] Tsutomu MATSUMOTO: "Research Trends in Cryptographic Techniques" 1986 Joint Convention Record of Institutes of Electrical and Information Engineers, Japan. 5. 5-8 (1986)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1986 Final Research Report Summary

URL: 

Published: 1987-03-31   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi