• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on design and analysis of lightweight hash functions

Research Project

Project/Area Number 22560376
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field Communication/Network engineering
Research InstitutionKobe University

Principal Investigator

KUWAKADO Hidenori  神戸大学, 工学研究科, 准教授 (30283914)

Project Period (FY) 2010 – 2012
Project Status Completed (Fiscal Year 2012)
Budget Amount *help
¥4,290,000 (Direct Cost: ¥3,300,000、Indirect Cost: ¥990,000)
Fiscal Year 2012: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2011: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2010: ¥2,210,000 (Direct Cost: ¥1,700,000、Indirect Cost: ¥510,000)
Keywords暗号 / セキュリティ / ハッシュ関数 / 量子アルゴリズム / 安全性解析 / ブロック暗号 / ライトウエイト暗号 / Feistel暗号
Research Abstract

Lightweight cryptographic primitives are required to achieve secure communication in the resource-constrained network such as a sensor network and an RFID network. In this research, lightweight hash functions (Lesamnta-LW, DbMMO) are proposed and are analyzed in terms of security under an appropriate model. On the other hand, we analyze the security of KATAN, which is a lightweight blockcipher, from the viewpoint of DbMMO's requirements. Furthermore, we show that a quantum computer compromises the securityof some blockciphers by analyzing the internal structure of a blockcipher.

Report

(4 results)
  • 2012 Annual Research Report   Final Research Report ( PDF )
  • 2011 Annual Research Report
  • 2010 Annual Research Report
  • Research Products

    (18 results)

All 2013 2012 2011 2010

All Journal Article (18 results) (of which Peer Reviewed: 8 results)

  • [Journal Article] Multilane Hashing Mode Suitable for Parallel Processing2013

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      Proceedings of 2013 Symposium on Cryptography and Information Security

      Volume: なし

    • NAID

      130003385293

    • Related Report
      2012 Annual Research Report
  • [Journal Article] Security on the Quantum-type Even-Mansour Cipher2012

    • Author(s)
      H.Kuwakadoand M.Morii
    • Journal Title

      Proc. of the 2012 International Symposium on Information Theory and its Applications

      Pages: 312-316

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Sponge Construction Using Multiple Primitives2012

    • Author(s)
      H.Kuwakado and S.Hirose
    • Journal Title

      Proceedings of The 2012 Symposium on Cryptography and Information Security

      Volume: 1C1-5

    • Related Report
      2012 Final Research Report
  • [Journal Article] Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing2012

    • Author(s)
      S.Hirose, H.Kuwakado, and H.Yoshida
    • Journal Title

      Information Security and Cryptology - ICISC 2011, Lecture Notes in Computer Science

      Volume: vol.7259 Pages: 346-364

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Security on the Quantum-type Even-Mansour Cipher2012

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      Proceedings of 2012 International Symposium on Information Theory and its Applications

      Volume: なし Pages: 312-316

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Related-Key Cube Attack on KATAN482011

    • Author(s)
      H.Kuwakadoand S.Hirose
    • Journal Title

      電子情報通信学会 2011 年ソサエティ大会講演論文集

    • Related Report
      2012 Final Research Report
  • [Journal Article] Model of Blockcipher-Based Hash Functions Suitable for Memory-Constrained Devices2011

    • Author(s)
      S.Hirose, H.Kuwakado, and H.Yoshida
    • Journal Title

      Proceedings of The 2011 Symposium on Cryptography and Information Security

      Volume: 4B1-1

    • Related Report
      2012 Final Research Report
  • [Journal Article] A Lightweight 256-bit Hash Function for Hardware and Low-end Devices: Lesamnta-LW2011

    • Author(s)
      S.Hirose, K.Ideguchi, H.Kuwakado, T.Owada, B.Preneel, and H.Yoshida
    • Journal Title

      Proceedings of the 13th Annual International Conference on Information Security and Cryptology, ICISC 2010, Lecture Notes in Computer Science

      Volume: vol.6584 Pages: 151-168

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Related-Key Cube Attack on KATAN482011

    • Author(s)
      Hidenori Kuwakado, Shoichi Hirose
    • Journal Title

      電子情報通信学会2011年ソサエティ大会講演論文集

      Pages: 167-167

    • Related Report
      2011 Annual Research Report
  • [Journal Article] Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing2011

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
    • Journal Title

      Preproceedings of the 14 the Annual Internationa 1 Conference on Information Security and Cryptography

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] odel of Blockcipher-Based Hash Functions Suitable for Memory-Constrained Devices2011

    • Author(s)
      S.Hirose, H.Kuwakado, H.Yoshida
    • Journal Title

      roceedings of The 2011 Symposium on Cryptography and Information Security

      Volume: (Web)

    • Related Report
      2010 Annual Research Report
  • [Journal Article] Distinguishing Attack and Key-Recovery Attack on the 3-Round Feistel Cipher2010

    • Author(s)
      H.Kuwakado and M.Morii
    • Journal Title

      Proceedings of the 2010 Symposium on Information Theory and its Applications

      Pages: 208-213

    • Related Report
      2012 Final Research Report
  • [Journal Article] Quantum Distinguisher Between the 3-Round Feistel Cipher and the Random Permutation2010

    • Author(s)
      H.Kuwakado and M.Morii
    • Journal Title

      Proceedings of the 2011 IEEE International Symposium on Information Theory

      Pages: 2682-2685

    • Related Report
      2012 Final Research Report
    • Peer Reviewed
  • [Journal Article] Quantum Key Search on the Even-Mansour Cipher2010

    • Author(s)
      H.Kuwakado and M.Morii
    • Journal Title

      Proceedings the 22th Quantum Information Technology Symposium

      Pages: 17-22

    • Related Report
      2012 Final Research Report
  • [Journal Article] Quantum Key Search on the Even-Mansour Cipher2010

    • Author(s)
      H.Kuwakado, M.Morii
    • Journal Title

      Proceedings the 22th Quantum Information Technology Symposium

      Pages: 17-22

    • Related Report
      2010 Annual Research Report
  • [Journal Article] Quantum Distinguisher Between the 3-Round Feistel Cipher and the Random Permutation2010

    • Author(s)
      H.Kuwakado, M.Morii
    • Journal Title

      Proceedings of the 2011 IEEE International Symposium on Information Theory

      Pages: 2682-2685

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Lightweight 256-bit Hash Function for Hardware and Low-end Devices : Lesamnta-LW2010

    • Author(s)
      S.Hirose, K.Ideguchi, H.Kuwakado, T.Owada, B.Preneel, H.Yoshida
    • Journal Title

      Proceedings of the 13th Annual International Conference on Information Security and Cryptology

      Volume: (Web)

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Distinguishing Attack and Key-Recovery Attack on the 3-Round Feistel Cipher2010

    • Author(s)
      H.Kuwakado, M.Morii
    • Journal Title

      Proceedings of the 2010 Symposium on Information Theory and its Applications

      Pages: 208-213

    • Related Report
      2010 Annual Research Report

URL: 

Published: 2010-08-23   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi