2014 Fiscal Year Annual Research Report
非理想的実装をも想定した暗号システムの設計と安全性評価
Project/Area Number |
14F04205
|
Research Institution | National Institute of Advanced Industrial Science and Technology |
Principal Investigator |
花岡 悟一郎 独立行政法人産業技術総合研究所, 情報技術研究部門, 研究グループ長 (30415731)
|
Co-Investigator(Kenkyū-buntansha) |
ZHANG ZONGYANG 独立行政法人産業技術総合研究所, 情報技術研究部門, 外国人特別研究員
|
Project Period (FY) |
2014-04-25 – 2016-03-31
|
Keywords | side-channel attack / public key encryption / cryptographic problem / security reduction |
Outline of Annual Research Achievements |
We followed the plan in the original application. Overall, we published several papers on international cryptographic conferences and journals, including the flag-ship cryptographic conference ASIACRYPT 2014, and famous security conference SCN 2014. We also attend several conferences and presented our paper. Our main research achievements can be categorized in the following two aspects. 1.We analyzed the security of public key encryption under the side-channel attacks and proposed a stronger security model, i.e., chosen-ciphertext security under post-challenge attacks. We then gave a generic construction to satisfy the security. 2.We analyzed the security of very basic cryptographic problems, called one-more cryptographic problems. We compared their hardness with existing well-known cryptographic problems, and presented black-box separations. Through the above research, we explore factors affecting perfect implementations, including bad randomness usage and new attacks, find possible approaches to overcome them, and design more secure and efficient cryptographic protocols that are very useful in the design of advanced security systems and are easy to be implemented in practice.
|
Current Status of Research Progress |
Current Status of Research Progress
2: Research has progressed on the whole more than it was originally planned.
Reason
We did research just as the plans in the application. The main reasons are as follows. 1) We already analyzed the security of public key encryption under side channel attacks, and presented stronger security models. This exactly achieved the research purpose. This also laid a good foundation for the further research in this fiscal year. In the meantime, we did some joint research with several researchers from abroad, which will help to complete our research project. 2) In order to collect enough research information and trace the most updated research in our field, Zhang also attended several famous conferences including workshop for real-world crypto. Zhang also had classes in a summer-school to learn updated knowledge about cryptography.
|
Strategy for Future Research Activity |
The problems of imperfect randomness and side channel attacks also have great influence on real-world cryptographic protocols in existing security infrastructure. To achieve the above objective (b), I intend to analyze globally deployed cryptographic protocols such as SSL/TLS, the IEEE wireless communication standards (WPA, WPA2) and SSH, disk encryption (including BitLocker, TrueCrypt, and FileVault). I plan to provide a formal analysis of these cryptographic protocols in an appropriate security model, highlight potential weaknesses (especially with respect to weak randomness and side-channel attacks), develop improved protocol specifications supported by formal security arguments, and securely implement them in the real world. This research is an extension and application of the research in previous year. I intend to further apply the above research results to real-world applications, e.g., privacy-preserving database search, which is closely related to a project applied by my host researcher. I plan to design cryptographic protocols that on one hand achieve advanced functionalities for database search, and on the other hand, satisfy higher security guarantees even against imperfect randomness and side-channel attacks. In addition, I will analyze the main bottleneck that affects efficiency and find appropriate techniques to bypass the bottleneck.
|
-
-
-
-
-
-
-
-
-
-
-
-
-
-
[Presentation] All-but-One Dual Projective Hashing and Its Applications2014
Author(s)
Zongyang Zhang, Yu Chen , Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao
Organizer
The 12th International Conference on Applied Cryptography and Network Security (ACNS 2014)
Place of Presentation
SwissTech Convention Center・Lausanne・ Switzerland
Year and Date
2014-06-10 – 2014-06-13