• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2013 Fiscal Year Final Research Report

Development of high-performance public-key cryptographic processors with tamper resistance

Research Project

  • PDF
Project/Area Number 22680003
Research Category

Grant-in-Aid for Young Scientists (A)

Allocation TypeSingle-year Grants
Research Field Computer system/Network
Research InstitutionTohoku University

Principal Investigator

HOMMA Naofumi  東北大学, 情報科学研究科, 准教授 (00343062)

Project Period (FY) 2010-04-01 – 2014-03-31
Keywords計算機システム / システムオンチップ / VLSI設計技術 / 暗号プロセッサ / 耐タンパー性
Research Abstract

This research project developed a high-performance cryptographic processor with a state-of-the-art tamper resistance capability and its design methodology. More precisely, we designed a processor architecture specified for exponentiation operation which is an integral part of public-key cryptographic operation, and developed an RSA processor highly resistant to side-channel attacks. In addition, we demonstrated the validity of the developed processor through an exhaustive set of experiments on side-channel attacks (i.e., chosen-message power/EM analysis attacks and fault injection attacks) against a prototype implementation of the developed processor. Moreover, we developed an automatic generator which generates RSA processors depending on various design specifications.

  • Research Products

    (29 results)

All 2013 2012 2011 2010 Other

All Journal Article (12 results) (of which Peer Reviewed: 12 results) Presentation (15 results) (of which Invited: 5 results) Book (1 results) Remarks (1 results)

  • [Journal Article] Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates2012

    • Author(s)
      Miroslav Knezevic, Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Akashi Satoh, Unal Kocabas, Junfeng Fan, Toshiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, Takafumi Aoki
    • Journal Title

      IEEE Transactions on Very Large Scale Integration Systems

      Volume: Vol.20, No.5 Pages: 827-840

    • Peer Reviewed
  • [Journal Article] A Formal Approach to Designing Arithmetic Circuits over Galois Fields Using Symbolic Computer Algebra2012

    • Author(s)
      Kazuya Saito, Naofumi Homma, and Takafumi Aoki
    • Journal Title

      Proceedings of the 17th Workshop on Synthesis And System Integration of Mixed Information technologies

      Pages: 153-158

    • Peer Reviewed
  • [Journal Article] A Formal Approach to Designing Cryptographic Processors Based on GF(2^m) Arithmetic Circuits2012

    • Author(s)
      Naofumi Homma, Kazuya Saito, and Takafumi Aoki
    • Journal Title

      IEEE Transactions on Information Forensics & Security

      Volume: Vol.7, No.1 Pages: 3-13

    • Peer Reviewed
  • [Journal Article] 暗号モジュールに対するサイドチャネル攻撃とその対策技術の研究動向2012

    • Author(s)
      林優一,本間尚文,水木敬明,青木孝文,曽根秀昭
    • Journal Title

      電気学会論文誌 A

      Volume: vol.132(2012), no.1 Pages: 9-12

    • Peer Reviewed
  • [Journal Article] High-performance Architecture for Concurrent Error Detection for AES Processors2011

    • Author(s)
      Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: Vol.E94-A, No.10 Pages: 1971-1980

    • Peer Reviewed
  • [Journal Article] Systematic design of RSA processors based on high-radix Montgomery multipliers2011

    • Author(s)
      Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, and Akashi Satoh
    • Journal Title

      IEEE Transactions on Very Large Scale Integration Systems

      Volume: Vol.19, No.7 Pages: 1136-1146

    • Peer Reviewed
  • [Journal Article] A Graph-Based Approach to Designing Multiple-Valued Arithmetic Algorithms2011

    • Author(s)
      Kazuya Saito, Naofumi Homma and Takafumi Aoki
    • Journal Title

      Proceedings of the 41st International Symposium on Multiple Valued Logic

      Pages: 27-32

    • Peer Reviewed
  • [Journal Article] RSA 暗号プロセッサ自動生成システムの設計と評価2010

    • Author(s)
      馬場祐一, 宮本篤志, 本間尚文, 青木孝文, 佐藤
    • Journal Title

      情報処理学会論文誌

      Volume: Vol.51, No.9 Pages: 1847-1858

    • Peer Reviewed
  • [Journal Article] Profiling attack using multivariate regression analysis2010

    • Author(s)
      Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, and Akashi Satoh
    • Journal Title

      IEICE Electronics Express

      Volume: Vol.7, No.15 Pages: 1139-1144

    • Peer Reviewed
  • [Journal Article] Multiple-Valued Constant-Power Adder and Its Application to Cryptographic Processor2010

    • Author(s)
      Naofumi Homma, Yuichi Baba, Atsushi Miyamoto, and Takafumi Aoki
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: Vol.E93-D, No.8 Pages: 2117-2125

    • Peer Reviewed
  • [Journal Article] Comparative Power Analysis of Modular Exponentiation Algorithms2010

    • Author(s)
      Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, and Adi Shamir
    • Journal Title

      IEEE Transactions on Computers

      Volume: Vol.59, No.6 Pages: 795-807

    • Peer Reviewed
  • [Journal Article] Design of tamper-resistant registers for multiple-valued cryptographic processors2010

    • Author(s)
      Yuichi Baba, Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki
    • Journal Title

      Proceedings of the 40th International Symposium on Multiple Valued Logic

      Pages: 67-72

    • Peer Reviewed
  • [Presentation] ガロア体上の乗算器モジュールジェネレータの構築2013

    • Author(s)
      岡本広太郎,本間尚文,青木孝文
    • Organizer
      第75回情報処理学会全国大会
    • Place of Presentation
      仙台 (3K-8,1-135-1-136)
    • Year and Date
      2013-03-07
  • [Presentation] Security Evaluation of Cryptographic Systems against Physical Attacks2012

    • Author(s)
      Naofumi Homma
    • Organizer
      2012 Bilateral Workshop between Tohoku University and National Tsing Hua University
    • Place of Presentation
      仙台
    • Year and Date
      2012-12-12
    • Invited
  • [Presentation] 正規基底表現されたガロア体上の算術演算回路の形式的設計に関する検討2012

    • Author(s)
      岡本広太郎, 本間尚文, 青木孝文
    • Organizer
      第35回多値論理フォーラム
    • Place of Presentation
      富山 (No. 7, 7-1-7-6)
    • Year and Date
      2012-09-15
  • [Presentation] Toward Formal Design of Cryptographic Processors Based on Galois Field Arithmetic2012

    • Author(s)
      Naofumi Homma
    • Organizer
      PROOFS (Security Proofs for Embedded Systems) Workshop
    • Place of Presentation
      ルーベン,ベルギー
    • Year and Date
      2012-09-13
    • Invited
  • [Presentation] ガロア体上の算術演算回路の自動生成システムの構築2012

    • Author(s)
      岡本広太郎, 本間尚文, 青木孝文
    • Organizer
      平成24年度 電気関係学会東北支部連合大会
    • Place of Presentation
      本庄 (No. 1I03, 115)
    • Year and Date
      2012-08-30
  • [Presentation] What are going to be the key MVL innovations over the next 10 years?2012

    • Author(s)
      Naofumi Homma
    • Organizer
      Special Panel Session on Upcoming Advances in MVL, the 42nd International Symposium on Multiple-Valued Logic
    • Place of Presentation
      ヴィクトリア,カナダ
    • Year and Date
      2012-05-14
    • Invited
  • [Presentation] ガロア体上の算術演算回路の形式的設計とそのAES 暗号プロセッサへの応用2012

    • Author(s)
      齋藤和也, 本間尚文, 青木孝文
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢 (Vol. 4C1-4, 1-8)
    • Year and Date
      2012-02-02
  • [Presentation] ガロア体上の算術演算回路の形式的表現に関する検討2012

    • Author(s)
      齋藤和也, 本間尚文, 青木孝文
    • Organizer
      第25回多値論理とその応用研究会
    • Place of Presentation
      宮崎 (No. 8, 38-44)
    • Year and Date
      2012-01-07
  • [Presentation] 算術回路グラフの暗号プロセッサ設計への応用2011

    • Author(s)
      齋藤和也,本間尚文,青木孝文
    • Organizer
      第34回多値論理フォーラム
    • Place of Presentation
      筑波 (No. 11, 11-1-11-6)
    • Year and Date
      2011-09-18
  • [Presentation] Efficient countermeasure against fault injection attacks on modular2011

    • Author(s)
      Sho Endo, Naofumi Homma and Takafumi Aoki
    • Organizer
      平成23年度 電気関係学会東北支部連合大会
    • Place of Presentation
      多賀城 (No. 1A03, 3)
    • Year and Date
      2011-08-25
  • [Presentation] DPA Contest V3 and SASEBO-W for V42011

    • Author(s)
      Naofumi Homma
    • Organizer
      International Workshop on Constructive Side-Channel Analysis and Secure Design
    • Place of Presentation
      ダルムシュタット,ドイツ
    • Year and Date
      2011-02-24
    • Invited
  • [Presentation] 算術回路グラフに基づく算術演算回路の形式的設計に関する検討2011

    • Author(s)
      齋藤和也, 本間尚文, 青木孝文
    • Organizer
      第24回多値論理とその応用研究会
    • Place of Presentation
      仙台 (No. 8, 8-1-8-6)
    • Year and Date
      2011-01-08
  • [Presentation] 多値算術演算回路向け算術アルゴリズムの形式的表現と検証に関する検討2010

    • Author(s)
      齋藤和也, 本間尚文, 青木孝文
    • Organizer
      第33回多値論理フォーラム
    • Place of Presentation
      広島 (No. 8, 8-1-8-6)
    • Year and Date
      20100900
  • [Presentation] 楕円曲線暗号ハードウェアの電力解析による安全性評価2010

    • Author(s)
      齋藤和也, 菅原健, 本間尚文, 青木孝文, 佐藤証
    • Organizer
      平成22年度 電気関係学会東北支部連合大会
    • Place of Presentation
      八戸 (No. 1E08, 143)
    • Year and Date
      20100800
  • [Presentation] 暗号LSI の設計技術2010

    • Author(s)
      本間尚文
    • Organizer
      日本学術振興会 シリコン超集積化システム第165委員会
    • Place of Presentation
      東京
    • Year and Date
      2010-04-16
    • Invited
  • [Book] サイドチャネル攻撃 (映像情報メディア学会誌,Vol.64, No.11)2010

    • Author(s)
      本間尚文,青木孝文
    • Total Pages
      1576-1579
    • Publisher
      映像情報メディア学会
  • [Remarks]

    • URL

      http://www.aoki.ecei.tohoku.ac.jp/arith/mg/index.html

URL: 

Published: 2015-06-25  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi