| June 29, 2001 | |
| Information-technology Promotion Agency, Japan (IPA) | |
| Telecommunications Advancement Organization of Japan (TAO) |
The background and objectives of the project are to make lists of cryptographic techniques for the common security basis to the Japanese e-Government of which the infrastructure and primary systems shall be implemented by FY 2003. The project was started in 2000 by IPA, and it was advanced to a joint project between IPA and TAO this spring.
The evaluation will be done by "Cryptography Research & Evaluation Committees," which consist of the preeminent specialists of cryptography in Japan.
The area of the evaluation of cryptographic techniques is asymmetric cryptographic schemes, symmetric ciphers cryptosystem, hash function, and pseudo-random number generator, which are the important security basis for the Japanese e-Government. The project evaluates the submitted techniques which corresponded to the open call and these techniques which the committees consider as necessary to be evaluated.
In e-Japan Priority Policy Program, which IT Strategic Headquarters in the cabinet established on March in 2001 based on the Basic Law on the Formation of an Advanced Information and Telecommunication Network Society, the Japanese government implements various policies to maintain securities and reliabilities on their advanced information and telecommunications networks as one of the world's most advanced IT nations, for example, to minimize the service failure caused by threats for the advanced information and telecommunications networks.
Especially, toward the promotion of electronic signatures and certification services and realization of an electronic government, the security evaluations and the standardization of cryptographic algorithms as key technologies today are increasingly important in order to ensure security and reliabilities on the advanced information and telecommunications networks.
So, the purpose of this project is to evaluate submitted cryptographic techniques in an objective manner and to recommend the techniques of high grade through the Ministry of Economy, Trade and Industry and the Ministry of Public Management, Home Affairs, Posts and Telecommunications to other ministries, to contribute realization of an electronic government supported with advanced reliabilities and securities.
To achieve the goals above, CRYPTREC Advisory Committee entrusts research and evaluation for cryptographic techniques to this CRYPTREC committees.
| (1) | Cryptography Research & Evaluation Committees are organized in association with IPA and TAO. |
| (2) | In addition to subcommittees for asymmetric cryptographic schemes and symmetric key cryptography, it is considered to form working groups discussing requirements for cryptographic techniques and guidelines concerning to the Japanese e-Government. Organization of CRYPTREC |
Attached Paper #1: Member Lists of Cryptography Research & Evaluation Committees
| (1) | General evaluation (Continual call) | ||||||||||||||||||
|
| (2) | Specific evaluation |
We evaluate the cryptographic techniques requested by another organization and the techniques that the CRYPTREC committees consider more detailed evaluation is necessary for a specific use. We may list the evaluated techniques as "cryptographic techniques for specific area" depending on the evaluation process. In 2001 we plan to evaluate the cryptographic techniques (block ciphers) requested to be evaluated by Japanese national committee of ISO/IEC JTC1/SC27, and the techniques (digital signatures) about Law concerning Electronic Signatures and Certification. |
| * | In order to carry out
general evaluation and specific evaluation,
we survey important factors concerning
the Japanese e-Government.
|
Classification of Cryptographic Techniques for Evaluation![]()
| (3) | Guideline for usage | ||||||||
|
The rough activity schedule of this year is made into the next table.![]()
| Committee Chair | Hideki Imai | The University of Tokyo |
| Adviser | Shigeo Tsujii | Chuo University |
| Member | Eiji Okamoto | Toho University |
| Member | Tatsuaki Okamoto | Nippon Telegraph and Telephone Corporation |
| Member | Toshinobu Kaneko | Science University of Tokyo |
| Member | Mitsuru Matsui | Mitsubishi Electric Corporation |
| Member | Tsutomu Matsumoto | Yokohama National University |
| Subcommittee Chair | Tsutomu Matsumoto | Yokohama National University |
| Member | Seigo Arita | NEC Corporation |
| Member | Kazuo Ohta | The University of Electro-Communications |
| Member | Jun Kogure | Fujitsu Laboratories Ltd. |
| Member | Yasuyuki Sakai | Mitsubishi Electric Corporation |
| Member | Hiroki Shizuya | Tohoku University |
| Member | Atsushi Shimbo | Toshiba Corporation |
| Member | Seiichi Susaki | Hitachi, Ltd. |
| Member | Natsume Matsuzaki | Matsushita Electric Industrial Co.,Ltd. |
| Member | Hajime Watanabe | National Institute of Advanced Industrial Science and Technology |
| Subcommittee Chair | Toshinobu Kaneko | Science University of Tokyo |
| Member | Kiyomichi Araki | Tokyo Institute of Technology |
| Member | Shinichi Kawamura | Toshiba Corporation |
| Member | Masayuki Kanda | Nippon Telegraph and Telephone Corporation |
| Member | Tohru Kohda | Kyushu University |
| Member | Kazukuni Kobara | The University of Tokyo |
| Member | Kouichi Sakurai | Kyushu University |
| Member | Takeshi Shimoyama | Fujitsu Laboratories Ltd. |
| Member | Kazuo Takaragi | Hitachi, Ltd. |
| Member | Makoto Tatebayashi | Matsushita Electric Industrial Co.,Ltd. |
| Member | Yukiyasu Tsunoo | NEC Corporation |
| Member | Toshio Tokita | Mitsubishi Electric Corporation |
| Member | Masakatu Morii | The University of Tokushima |
We will be public the submission procedure of cryptographic techniques for this year, 2001. We plan the call for cryptographic techniques based on the procedure for the year 2000. The outline of the procedure is as follows.
The purpose of this project is to list valid cryptographic techniques, together with their of their security and implementation by open call and evaluation.
We assume that submitted cryptographic techniques can be supplied for the Japanese e-Government. Our evaluation program is an open process.
| (1) | Newly submitted cryptographic techniques |
| We require its all algorithm and technical information are open to the public, or the date of open is determined at the dead line of submission. The specification of the technique must be open, that is, the technique can be implemented and evaluated by domestic and foreign persons. We want that newly cryptographic techniques have some advantages than the detail-evaluated cryptographic techniques in CRYPTREC 2000. The proposer can submit only one cryptographic technique which is based on the same basis in our technical categories (see Section 3. Categories of Cryptographic Techniques). Newly submitted techniques will be applied screening evaluation in 2001, and full evaluation in 2002. |
|
| (2) | Continually evaluated cryptographic techniques (prepare the same submission for newly submitted techniques) |
We consider the cryptographic techniques which hold the following conditions as continually evaluated cryptographic techniques
We request the information about recent its status of security, availability and etc. If it has something changes in its cryptographic technique, CRYPTREC committees consider it as newly submitted cryptographic technique. |
A cryptographic technique, which has a function
and is realized by the known algorithm,
should be submitted to the base category.
For example,
the hash function,
which is based on a block cipher and constructed by
ISO10118-2 (part2),
should be submitted to the block cipher category,
and the key sharing,
which is based on a confidential technique,
should be submitted to the confidentiality category,
not to the key-sharing category.
| (1) | Asymmetric Cryptographic Schemes | ||||||||
| The target of the call for asymmetric cryptographic schemes is the following 4 categories. | |||||||||
| [classification based on uses] | |||||||||
|
|||||||||
| (2) | Symmetric Ciphers | ||||||||
The target of the call for symmetric key cryptography is the following 3 categories.
|
|||||||||
| (3) | Hash Functions | ||||||||
| (4) | Pseudo-Random Number Generators |
The necessary information in the document is based on the call for cryptographic techniques in 2000. The document should be prepared in both Japanese and English.
| (1) | Cryptographic Techniques Application Form | ||||||||||
| (2) | Cryptographic Techniques Specifications | ||||||||||
| (3) | Self-Evaluation Report | ||||||||||
| (4) | Test vectors | ||||||||||
| (5) | Reference program | ||||||||||
| (6) | Information regarding the public availability status
|
See "procedure for submitting cryptographic techniques" which will be available in early August.
A public meeting regarding to the submitted techniques will be hold after the deadline of the submission. The applicant should present its technique.
Before finishing writing the annual report, we hold a public workshop, on which the participants discuss the evaluations. We consider that the evaluation reports, which are written by outer-evaluators and the committees members, are presented.
| June | Announcement of the outline of the committees activities including the outline of the submission procedure |
| early August | Announcement of the detailed procedure for submitting cryptographic techniques |
| August to September | Call for Cryptographic Techniques |
| early October | Meeting for Submission Techniques Introduction |
| August to January 2002 | Periods of Screening evaluation and Continual Evaluation |
| January 2002 | Cryptographic Techniques Evaluation Workshop |
| after March 2002 | Plan to announce of CRYPTREC Report 2001 |
![]() |
For further information, contact to:
|
Copyright (c) 2001 Information-technology Promotion Agency, Japan. All rights reserved.